CVE-2025-14579: CWE-79 Cross-Site Scripting (XSS) in Quiz Maker
CVE-2025-14579 is a medium severity Stored Cross-Site Scripting (XSS) vulnerability in the Quiz Maker WordPress plugin versions before 6. 7. 0. 89. It arises because certain plugin settings are not properly sanitized or escaped, allowing high privilege users such as administrators to inject malicious scripts. This vulnerability can be exploited even when the unfiltered_html capability is disabled, such as in multisite WordPress setups. Exploitation requires high privileges and user interaction, and it can lead to limited confidentiality and integrity impacts, but no direct availability impact. No known exploits are currently reported in the wild. European organizations using affected versions of Quiz Maker, especially those with multisite WordPress deployments, should prioritize patching or mitigating this issue to prevent potential stored XSS attacks that could compromise administrative sessions or site content.
AI Analysis
Technical Summary
CVE-2025-14579 is a Stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79 affecting the Quiz Maker WordPress plugin prior to version 6.7.0.89. The root cause is the plugin's failure to properly sanitize and escape certain settings fields, which allows high privilege users, such as administrators, to inject malicious JavaScript code into the plugin's stored data. This vulnerability is particularly notable because it bypasses the typical WordPress unfiltered_html capability restriction, meaning that even in environments where unfiltered HTML is disallowed (e.g., multisite configurations), the vulnerability remains exploitable. The attack vector requires network access (remote), low attack complexity, and high privileges, with the need for user interaction (e.g., an admin saving malicious settings). The impact includes limited confidentiality and integrity loss due to potential session hijacking, defacement, or unauthorized actions performed via the injected script, but it does not affect availability. The vulnerability has a CVSS 3.1 base score of 4.8, indicating medium severity. No public exploits have been reported yet, but the presence of stored XSS in administrative contexts poses a significant risk if exploited. The vulnerability was reserved in December 2025 and published in January 2026, with WPScan as the assigner. No official patches or mitigation links were provided in the data, but upgrading to version 6.7.0.89 or later is implied to resolve the issue.
Potential Impact
For European organizations, the primary impact of CVE-2025-14579 lies in the potential compromise of administrative accounts and site integrity on WordPress sites using the vulnerable Quiz Maker plugin. Stored XSS in administrative settings can lead to session hijacking, unauthorized changes to site content or configuration, and potential lateral movement within the CMS environment. While the vulnerability does not directly impact availability, the integrity and confidentiality of sensitive data and administrative controls can be undermined. Organizations operating multisite WordPress installations are particularly at risk since the vulnerability bypasses unfiltered_html restrictions typically used to mitigate XSS risks. This could lead to broader compromise across multiple sites managed under a single WordPress instance. Given the widespread use of WordPress in Europe for business, education, and government websites, exploitation could result in reputational damage, data breaches, and compliance issues under regulations such as GDPR if personal data is exposed or manipulated. The lack of known exploits reduces immediate risk, but the medium severity and ease of exploitation by high privilege users necessitate prompt attention.
Mitigation Recommendations
European organizations should immediately verify if they use the Quiz Maker WordPress plugin and identify the installed version. If running a version prior to 6.7.0.89, they should prioritize upgrading to the latest patched version as soon as it becomes available. Until patched, administrators should restrict plugin access to only the most trusted users and consider temporarily disabling the plugin if feasible. Implementing strict role-based access controls (RBAC) to limit the number of users with high privileges can reduce exploitation risk. Additionally, applying Web Application Firewall (WAF) rules that detect and block suspicious script injections in plugin settings fields may provide interim protection. Regularly auditing plugin settings for unexpected or suspicious content can help detect exploitation attempts early. Organizations should also ensure their WordPress core and all plugins are kept up to date and monitor security advisories from plugin developers and WPScan. For multisite setups, extra caution is advised to monitor cross-site contamination and enforce strict user permissions. Finally, educating administrators about the risks of stored XSS and safe plugin configuration practices will help mitigate human error.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2025-14579: CWE-79 Cross-Site Scripting (XSS) in Quiz Maker
Description
CVE-2025-14579 is a medium severity Stored Cross-Site Scripting (XSS) vulnerability in the Quiz Maker WordPress plugin versions before 6. 7. 0. 89. It arises because certain plugin settings are not properly sanitized or escaped, allowing high privilege users such as administrators to inject malicious scripts. This vulnerability can be exploited even when the unfiltered_html capability is disabled, such as in multisite WordPress setups. Exploitation requires high privileges and user interaction, and it can lead to limited confidentiality and integrity impacts, but no direct availability impact. No known exploits are currently reported in the wild. European organizations using affected versions of Quiz Maker, especially those with multisite WordPress deployments, should prioritize patching or mitigating this issue to prevent potential stored XSS attacks that could compromise administrative sessions or site content.
AI-Powered Analysis
Technical Analysis
CVE-2025-14579 is a Stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79 affecting the Quiz Maker WordPress plugin prior to version 6.7.0.89. The root cause is the plugin's failure to properly sanitize and escape certain settings fields, which allows high privilege users, such as administrators, to inject malicious JavaScript code into the plugin's stored data. This vulnerability is particularly notable because it bypasses the typical WordPress unfiltered_html capability restriction, meaning that even in environments where unfiltered HTML is disallowed (e.g., multisite configurations), the vulnerability remains exploitable. The attack vector requires network access (remote), low attack complexity, and high privileges, with the need for user interaction (e.g., an admin saving malicious settings). The impact includes limited confidentiality and integrity loss due to potential session hijacking, defacement, or unauthorized actions performed via the injected script, but it does not affect availability. The vulnerability has a CVSS 3.1 base score of 4.8, indicating medium severity. No public exploits have been reported yet, but the presence of stored XSS in administrative contexts poses a significant risk if exploited. The vulnerability was reserved in December 2025 and published in January 2026, with WPScan as the assigner. No official patches or mitigation links were provided in the data, but upgrading to version 6.7.0.89 or later is implied to resolve the issue.
Potential Impact
For European organizations, the primary impact of CVE-2025-14579 lies in the potential compromise of administrative accounts and site integrity on WordPress sites using the vulnerable Quiz Maker plugin. Stored XSS in administrative settings can lead to session hijacking, unauthorized changes to site content or configuration, and potential lateral movement within the CMS environment. While the vulnerability does not directly impact availability, the integrity and confidentiality of sensitive data and administrative controls can be undermined. Organizations operating multisite WordPress installations are particularly at risk since the vulnerability bypasses unfiltered_html restrictions typically used to mitigate XSS risks. This could lead to broader compromise across multiple sites managed under a single WordPress instance. Given the widespread use of WordPress in Europe for business, education, and government websites, exploitation could result in reputational damage, data breaches, and compliance issues under regulations such as GDPR if personal data is exposed or manipulated. The lack of known exploits reduces immediate risk, but the medium severity and ease of exploitation by high privilege users necessitate prompt attention.
Mitigation Recommendations
European organizations should immediately verify if they use the Quiz Maker WordPress plugin and identify the installed version. If running a version prior to 6.7.0.89, they should prioritize upgrading to the latest patched version as soon as it becomes available. Until patched, administrators should restrict plugin access to only the most trusted users and consider temporarily disabling the plugin if feasible. Implementing strict role-based access controls (RBAC) to limit the number of users with high privileges can reduce exploitation risk. Additionally, applying Web Application Firewall (WAF) rules that detect and block suspicious script injections in plugin settings fields may provide interim protection. Regularly auditing plugin settings for unexpected or suspicious content can help detect exploitation attempts early. Organizations should also ensure their WordPress core and all plugins are kept up to date and monitor security advisories from plugin developers and WPScan. For multisite setups, extra caution is advised to monitor cross-site contamination and enforce strict user permissions. Finally, educating administrators about the risks of stored XSS and safe plugin configuration practices will help mitigate human error.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- WPScan
- Date Reserved
- 2025-12-12T14:36:59.215Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69648fedda2266e838f9f65f
Added to database: 1/12/2026, 6:08:45 AM
Last enriched: 1/19/2026, 7:42:03 AM
Last updated: 2/7/2026, 10:42:45 AM
Views: 56
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.