Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-3470: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in totalsoft TS Poll – Survey, Versus Poll, Image Poll, Video Poll

0
Medium
VulnerabilityCVE-2025-3470cvecve-2025-3470cwe-89
Published: Tue Apr 15 2025 (04/15/2025, 01:44:34 UTC)
Source: CVE Database V5
Vendor/Project: totalsoft
Product: TS Poll – Survey, Versus Poll, Image Poll, Video Poll

Description

CVE-2025-3470 is a medium severity SQL Injection vulnerability in the totalsoft TS Poll WordPress plugin versions up to 2. 4. 6. It arises from improper neutralization of special elements in the 's' parameter, allowing authenticated users with Administrator-level privileges to inject additional SQL queries. This flaw enables attackers to extract sensitive database information without requiring user interaction. The vulnerability does not impact data integrity or availability but poses a significant confidentiality risk. Exploitation requires high privileges, limiting the attack surface to compromised or malicious administrators. No known public exploits exist yet, but patching or mitigation is critical to prevent data leakage. Organizations using this plugin should prioritize updating or applying mitigations to avoid potential data breaches. Countries with high WordPress usage and significant deployments of this plugin are most at risk.

AI-Powered Analysis

AILast updated: 02/25/2026, 22:35:02 UTC

Technical Analysis

CVE-2025-3470 is a SQL Injection vulnerability classified under CWE-89 affecting the totalsoft TS Poll – Survey, Versus Poll, Image Poll, Video Poll plugin for WordPress, specifically all versions up to and including 2.4.6. The vulnerability stems from insufficient escaping and lack of proper preparation of the 's' parameter in SQL queries, allowing an authenticated attacker with Administrator-level access or higher to append arbitrary SQL commands to existing queries. This improper neutralization of special elements in SQL commands enables attackers to extract sensitive information from the underlying database. The vulnerability requires no user interaction but does require high-level privileges, which means exploitation is limited to users who already have significant access to the WordPress environment. The CVSS v3.1 score is 4.9 (medium severity), reflecting the network attack vector with low attack complexity but requiring privileges. The impact is primarily on confidentiality, with no direct impact on integrity or availability. No known exploits are currently reported in the wild. The vulnerability was reserved and published in April 2025, and no official patches have been linked yet. Organizations using this plugin should be aware of the risk of data leakage through SQL Injection and take immediate steps to mitigate or patch the vulnerability once available.

Potential Impact

The primary impact of CVE-2025-3470 is the unauthorized disclosure of sensitive information stored in the WordPress database. Since the vulnerability allows SQL Injection by authenticated administrators, attackers who have gained or already possess high-level access can leverage this flaw to extract confidential data such as user credentials, personal information, or configuration details. Although the vulnerability does not directly affect data integrity or availability, the exposure of sensitive data can lead to further attacks, including privilege escalation, identity theft, or targeted phishing campaigns. For organizations worldwide, especially those relying on WordPress with the affected TS Poll plugin, this vulnerability represents a significant confidentiality risk. The requirement for administrator privileges limits exploitation to insider threats or compromised admin accounts, but given the widespread use of WordPress and the plugin, the potential attack surface is substantial. Failure to address this vulnerability could result in data breaches, regulatory non-compliance, reputational damage, and financial losses.

Mitigation Recommendations

To mitigate CVE-2025-3470, organizations should take the following specific actions: 1) Immediately restrict administrator access to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication to reduce the risk of compromised admin accounts. 2) Monitor and audit administrator activities and database queries for unusual or unauthorized behavior that could indicate exploitation attempts. 3) Apply principle of least privilege by limiting the number of users with administrator-level access and segregating duties where possible. 4) Temporarily disable or remove the TS Poll plugin if it is not essential, until a vendor patch is released. 5) If patching is not yet available, implement Web Application Firewall (WAF) rules tailored to detect and block SQL Injection attempts targeting the 's' parameter in the plugin’s requests. 6) Regularly back up WordPress databases and configurations to enable recovery in case of compromise. 7) Stay informed on vendor updates and apply official patches promptly once released. 8) Conduct security testing and code review of customizations related to the plugin to identify and remediate similar injection flaws.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-04-09T14:36:39.882Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b2bb7ef31ef0b54ef68

Added to database: 2/25/2026, 9:35:39 PM

Last enriched: 2/25/2026, 10:35:02 PM

Last updated: 2/26/2026, 6:11:00 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats