Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-6739: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in bauc WPQuiz

0
Medium
VulnerabilityCVE-2025-6739cvecve-2025-6739cwe-89
Published: Fri Jul 04 2025 (07/04/2025, 01:44:00 UTC)
Source: CVE Database V5
Vendor/Project: bauc
Product: WPQuiz

Description

The WPQuiz plugin for WordPress is vulnerable to SQL Injection via the 'id' attribute of the 'wpquiz' shortcode in all versions up to, and including, 0.4.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 15:47:42 UTC

Technical Analysis

CVE-2025-6739 is an SQL Injection vulnerability identified in the WPQuiz plugin for WordPress, affecting all versions up to and including 0.4.2. The root cause is insufficient escaping and lack of prepared statements for the 'id' attribute within the 'wpquiz' shortcode. This flaw allows authenticated users with Contributor-level permissions or higher to append arbitrary SQL commands to existing queries. Since WordPress Contributor roles can create and edit content but not publish, this expands the attack surface beyond administrators. The injection enables attackers to extract sensitive information from the underlying database, such as user data or site configuration details, without impacting data integrity or availability. The vulnerability requires no user interaction and can be exploited remotely over the network. Although no public exploits are currently known, the medium CVSS score of 6.5 reflects the significant confidentiality impact combined with relatively low attack complexity and privileges required. The vulnerability is categorized under CWE-89, highlighting improper neutralization of special elements in SQL commands. No official patches have been released yet, emphasizing the need for immediate mitigation steps.

Potential Impact

The primary impact of CVE-2025-6739 is unauthorized disclosure of sensitive information stored in the WordPress database, which may include user credentials, personal data, or site configuration details. This can lead to privacy violations, further targeted attacks, or credential compromise. Since the vulnerability requires authenticated access at Contributor level or above, attackers may leverage compromised or created accounts to exploit the flaw. The lack of impact on integrity or availability means the site’s content and uptime remain unaffected, but confidentiality breaches can undermine trust and compliance with data protection regulations. Organizations running WPQuiz on high-traffic or sensitive websites face increased risk of data leakage. The vulnerability also raises concerns for multi-tenant WordPress hosting environments where one compromised site could expose data. Although no exploits are known in the wild, the ease of exploitation and common use of WordPress globally make this a notable threat.

Mitigation Recommendations

To mitigate CVE-2025-6739, organizations should first check for any official patches or updates from the WPQuiz plugin vendor and apply them immediately once available. In the absence of patches, administrators should restrict Contributor-level permissions to trusted users only and audit existing accounts for suspicious activity. Implementing Web Application Firewall (WAF) rules to detect and block SQL injection patterns targeting the 'id' parameter in the 'wpquiz' shortcode can provide temporary protection. Additionally, site owners should consider disabling or removing the WPQuiz plugin if it is not essential. Developers can also manually sanitize and validate the 'id' parameter using prepared statements or parameterized queries to prevent injection. Regular security audits and monitoring of database query logs for anomalies related to WPQuiz usage can help detect exploitation attempts early. Finally, educating content creators about the risks of elevated privileges and enforcing least privilege principles will reduce the attack surface.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-06-26T16:43:22.986Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68673b5e6f40f0eb729e5fc4

Added to database: 7/4/2025, 2:24:30 AM

Last enriched: 2/26/2026, 3:47:42 PM

Last updated: 3/24/2026, 11:57:17 PM

Views: 91

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses