Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67976: Missing Authorization in Bob Watu Quiz

0
Medium
VulnerabilityCVE-2025-67976cvecve-2025-67976
Published: Tue Dec 16 2025 (12/16/2025, 08:12:58 UTC)
Source: CVE Database V5
Vendor/Project: Bob
Product: Watu Quiz

Description

Missing Authorization vulnerability in Bob Watu Quiz watu allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Watu Quiz: from n/a through <= 3.4.5.

AI-Powered Analysis

AILast updated: 01/21/2026, 01:13:58 UTC

Technical Analysis

CVE-2025-67976 is a missing authorization vulnerability identified in the Bob Watu Quiz plugin, a WordPress plugin used for creating quizzes and assessments. The vulnerability arises from incorrectly configured access control security levels, which allow users with limited privileges (PR:L - low privileges) to perform unauthorized actions or access data that should be restricted. The vulnerability is exploitable remotely (AV:N) without requiring user interaction (UI:N), increasing its risk profile. The impact is primarily on confidentiality (C:H), meaning sensitive information could be exposed, but there is no impact on integrity or availability. The vulnerability affects all versions up to and including 3.4.5. Although no known exploits are currently in the wild and no official patches have been released, the flaw represents a significant risk for organizations relying on this plugin for educational or training purposes. The CVSS score of 6.5 (medium severity) reflects the ease of exploitation combined with the potential for data exposure. The root cause is a failure to properly enforce authorization checks on certain functionalities within the plugin, allowing attackers with low-level access to bypass restrictions. This could lead to unauthorized viewing of quiz results, user data, or other sensitive information managed by the plugin. Given the plugin’s usage in WordPress environments, the vulnerability could be leveraged as part of a broader attack chain if combined with other weaknesses.

Potential Impact

For European organizations, especially those in education, e-learning, and training sectors that use WordPress and the Watu Quiz plugin, this vulnerability poses a risk of unauthorized data disclosure. Exposure of quiz results or user information could lead to privacy violations, regulatory non-compliance (e.g., GDPR), and reputational damage. Since the vulnerability does not affect integrity or availability, it is less likely to disrupt operations directly but could facilitate further attacks if sensitive data is leaked. Organizations with multi-tenant or public-facing quiz platforms are particularly at risk. The medium severity suggests that while the threat is not immediately critical, it requires timely remediation to prevent exploitation. The lack of known exploits in the wild provides a window for proactive defense. Failure to address this vulnerability could also attract targeted attacks from threat actors interested in academic or employee assessment data.

Mitigation Recommendations

1. Immediately audit and review access control configurations within the Watu Quiz plugin to ensure that only authorized users can access sensitive quiz data and administrative functions. 2. Restrict plugin access to trusted user roles and minimize the number of users with elevated privileges. 3. Monitor logs for unusual access patterns or privilege escalations related to the plugin. 4. Implement network-level protections such as web application firewalls (WAFs) to detect and block suspicious requests targeting the plugin endpoints. 5. Stay informed on vendor communications and apply patches promptly once released. 6. Consider temporarily disabling or limiting the plugin’s functionality if a patch is not yet available and the risk is deemed high. 7. Conduct regular vulnerability assessments and penetration tests focusing on WordPress plugins and access control mechanisms. 8. Educate administrators on secure plugin configuration and the importance of least privilege principles.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-15T10:00:28.857Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69411753594e45819d70ccd0

Added to database: 12/16/2025, 8:24:51 AM

Last enriched: 1/21/2026, 1:13:58 AM

Last updated: 2/4/2026, 6:48:22 AM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats