Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12620: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in ays-pro Poll Maker – Versus Polls, Anonymous Polls, Image Polls

0
Medium
VulnerabilityCVE-2025-12620cvecve-2025-12620cwe-89
Published: Thu Nov 13 2025 (11/13/2025, 05:30:39 UTC)
Source: CVE Database V5
Vendor/Project: ays-pro
Product: Poll Maker – Versus Polls, Anonymous Polls, Image Polls

Description

The Poll Maker – Versus Polls, Anonymous Polls, Image Polls plugin for WordPress is vulnerable to generic SQL Injection via the ‘filterbyauthor’ parameter in all versions up to, and including, 6.0.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

AI-Powered Analysis

AILast updated: 11/13/2025, 06:27:13 UTC

Technical Analysis

CVE-2025-12620 identifies an SQL Injection vulnerability in the WordPress plugin 'Poll Maker – Versus Polls, Anonymous Polls, Image Polls' developed by ays-pro. The vulnerability arises from improper neutralization of special elements in the 'filterbyauthor' parameter, which is used in SQL queries without adequate escaping or prepared statements. This allows an authenticated attacker with Administrator-level privileges or higher to append arbitrary SQL commands to existing queries. The attack vector is network-based, requiring no user interaction but necessitating elevated privileges, limiting the attack surface to trusted users with admin access. The vulnerability impacts all versions up to and including 6.0.7 of the plugin. Exploiting this flaw can lead to unauthorized disclosure of sensitive information stored in the database, such as user data or configuration details, but does not allow modification or deletion of data, nor does it affect system availability. The CVSS v3.1 base score is 4.9, reflecting medium severity due to the requirement for high privileges and the limited scope of impact. No patches have been linked yet, and no known exploits are reported in the wild. The vulnerability is categorized under CWE-89, which covers SQL Injection issues stemming from improper input validation and query construction.

Potential Impact

For European organizations, this vulnerability poses a risk of sensitive data exposure if the affected plugin is used on WordPress sites, especially those managing polls or user-generated content. Since exploitation requires Administrator-level access, the threat mainly concerns insider threats or compromised admin accounts. Data leakage could include personally identifiable information (PII), internal configuration, or other sensitive database contents, potentially violating GDPR and other data protection regulations. The impact on confidentiality is high, but integrity and availability remain unaffected. Organizations relying on this plugin for public or internal polling services could face reputational damage and compliance issues if exploited. The absence of known exploits reduces immediate risk, but the presence of the vulnerability in widely deployed WordPress environments means attackers could develop exploits in the future. European companies with high WordPress usage and those in regulated sectors (finance, healthcare, government) should be particularly vigilant.

Mitigation Recommendations

Immediate mitigation should include restricting Administrator-level access to trusted personnel and enforcing strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. Organizations should monitor logs for unusual SQL query patterns or unexpected database access from admin accounts. Since no official patch is currently linked, administrators should consider temporarily disabling or removing the vulnerable plugin if feasible. Alternatively, applying manual code review and patching to sanitize the 'filterbyauthor' parameter using prepared statements or parameterized queries can mitigate the risk. Regular backups and database encryption can limit data exposure impact. Additionally, implementing Web Application Firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting this parameter can provide a protective layer. Organizations should subscribe to vendor updates and apply official patches promptly once available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-02T16:28:40.451Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691579339e485ce1c4d841f5

Added to database: 11/13/2025, 6:22:43 AM

Last enriched: 11/13/2025, 6:27:13 AM

Last updated: 11/13/2025, 7:58:03 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats