CVE-2025-6790: CWE-352 Cross-Site Request Forgery (CSRF) in Quiz and Survey Master (QSM)
The Quiz and Survey Master (QSM) WordPress plugin before 10.2.3 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack.
AI Analysis
Technical Summary
CVE-2025-6790 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Quiz and Survey Master (QSM) WordPress plugin versions prior to 10.2.3. The vulnerability arises because the plugin lacks proper CSRF protections when updating its settings. Specifically, no CSRF token or equivalent verification mechanism is implemented to ensure that requests to change plugin settings originate from legitimate, authenticated users. This security gap allows an attacker to craft malicious web requests that, when executed by an authenticated WordPress administrator, can alter the plugin's configuration without their consent or knowledge. Since the QSM plugin is used to create quizzes and surveys within WordPress sites, unauthorized changes to its settings could lead to a range of malicious outcomes, including the injection of malicious content, disruption of survey functionality, or manipulation of data collected through the plugin. The vulnerability requires the attacker to trick an authenticated admin into visiting a malicious webpage or clicking a crafted link, leveraging the admin's active session to perform unauthorized actions. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability was reserved in June 2025 and published in August 2025, indicating recent discovery and disclosure. The absence of a patch link suggests that a fixed version (10.2.3 or later) is either newly released or forthcoming. This vulnerability is classified under CWE-352, which corresponds to CSRF issues that allow unauthorized commands to be transmitted from a user that the web application trusts.
Potential Impact
For European organizations using WordPress sites with the QSM plugin, this vulnerability poses a significant risk to the integrity and availability of their web-based quiz and survey functionalities. An attacker exploiting this flaw could alter plugin settings to disrupt normal operations, potentially leading to data loss or corruption of survey results, which may affect decision-making processes reliant on this data. Additionally, unauthorized configuration changes could be leveraged to inject malicious scripts or redirect users, thereby compromising confidentiality and potentially facilitating further attacks such as phishing or malware distribution. Since the attack requires an authenticated admin session, the impact is limited to organizations where administrators may be tricked into visiting malicious sites, highlighting the importance of user awareness. However, the ease of exploitation through social engineering and the high privileges of admin accounts amplify the threat. For organizations in sectors like education, market research, or any domain relying on survey data integrity, this vulnerability could undermine trust and operational continuity. Moreover, if exploited at scale, it could lead to reputational damage and regulatory scrutiny under European data protection laws such as GDPR, especially if personal data collected via surveys is compromised or manipulated.
Mitigation Recommendations
European organizations should immediately verify the version of the QSM plugin installed on their WordPress sites and upgrade to version 10.2.3 or later where the CSRF protection is implemented. Until the patch is applied, administrators should be advised to avoid clicking on suspicious links or visiting untrusted websites while logged into WordPress admin accounts to reduce the risk of CSRF exploitation. Implementing additional security controls such as Web Application Firewalls (WAFs) with rules to detect and block CSRF attack patterns can provide a temporary safeguard. Organizations should also enforce strict session management policies, including short session timeouts and multi-factor authentication (MFA) for admin accounts, to limit the window of opportunity for attackers. Regular security awareness training focused on phishing and social engineering can help reduce the likelihood of an admin falling victim to CSRF attack vectors. Finally, monitoring and logging changes to plugin settings can help detect unauthorized modifications early, enabling rapid incident response.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-6790: CWE-352 Cross-Site Request Forgery (CSRF) in Quiz and Survey Master (QSM)
Description
The Quiz and Survey Master (QSM) WordPress plugin before 10.2.3 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack.
AI-Powered Analysis
Technical Analysis
CVE-2025-6790 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Quiz and Survey Master (QSM) WordPress plugin versions prior to 10.2.3. The vulnerability arises because the plugin lacks proper CSRF protections when updating its settings. Specifically, no CSRF token or equivalent verification mechanism is implemented to ensure that requests to change plugin settings originate from legitimate, authenticated users. This security gap allows an attacker to craft malicious web requests that, when executed by an authenticated WordPress administrator, can alter the plugin's configuration without their consent or knowledge. Since the QSM plugin is used to create quizzes and surveys within WordPress sites, unauthorized changes to its settings could lead to a range of malicious outcomes, including the injection of malicious content, disruption of survey functionality, or manipulation of data collected through the plugin. The vulnerability requires the attacker to trick an authenticated admin into visiting a malicious webpage or clicking a crafted link, leveraging the admin's active session to perform unauthorized actions. No known exploits are currently reported in the wild, and no CVSS score has been assigned yet. The vulnerability was reserved in June 2025 and published in August 2025, indicating recent discovery and disclosure. The absence of a patch link suggests that a fixed version (10.2.3 or later) is either newly released or forthcoming. This vulnerability is classified under CWE-352, which corresponds to CSRF issues that allow unauthorized commands to be transmitted from a user that the web application trusts.
Potential Impact
For European organizations using WordPress sites with the QSM plugin, this vulnerability poses a significant risk to the integrity and availability of their web-based quiz and survey functionalities. An attacker exploiting this flaw could alter plugin settings to disrupt normal operations, potentially leading to data loss or corruption of survey results, which may affect decision-making processes reliant on this data. Additionally, unauthorized configuration changes could be leveraged to inject malicious scripts or redirect users, thereby compromising confidentiality and potentially facilitating further attacks such as phishing or malware distribution. Since the attack requires an authenticated admin session, the impact is limited to organizations where administrators may be tricked into visiting malicious sites, highlighting the importance of user awareness. However, the ease of exploitation through social engineering and the high privileges of admin accounts amplify the threat. For organizations in sectors like education, market research, or any domain relying on survey data integrity, this vulnerability could undermine trust and operational continuity. Moreover, if exploited at scale, it could lead to reputational damage and regulatory scrutiny under European data protection laws such as GDPR, especially if personal data collected via surveys is compromised or manipulated.
Mitigation Recommendations
European organizations should immediately verify the version of the QSM plugin installed on their WordPress sites and upgrade to version 10.2.3 or later where the CSRF protection is implemented. Until the patch is applied, administrators should be advised to avoid clicking on suspicious links or visiting untrusted websites while logged into WordPress admin accounts to reduce the risk of CSRF exploitation. Implementing additional security controls such as Web Application Firewalls (WAFs) with rules to detect and block CSRF attack patterns can provide a temporary safeguard. Organizations should also enforce strict session management policies, including short session timeouts and multi-factor authentication (MFA) for admin accounts, to limit the window of opportunity for attackers. Regular security awareness training focused on phishing and social engineering can help reduce the likelihood of an admin falling victim to CSRF attack vectors. Finally, monitoring and logging changes to plugin settings can help detect unauthorized modifications early, enabling rapid incident response.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2025-06-27T14:08:34.258Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 689d7c3ead5a09ad0057c473
Added to database: 8/14/2025, 6:03:42 AM
Last enriched: 8/14/2025, 6:18:32 AM
Last updated: 8/14/2025, 7:16:29 AM
Views: 3
Related Threats
CVE-2025-8954: SQL Injection in PHPGurukul Hospital Management System
MediumCVE-2025-8953: SQL Injection in SourceCodester COVID 19 Testing Management System
MediumCVE-2025-54472: CWE-400 Uncontrolled Resource Consumption in Apache Software Foundation Apache bRPC
UnknownCVE-2025-48862: CWE-1104 Use of Unmaintained Third Party Components in Bosch Rexroth AG ctrlX OS - Setup
HighCVE-2025-48861: CWE-284 Improper Access Control in Bosch Rexroth AG ctrlX OS - Setup
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.