Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67987: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in ExpressTech Systems Quiz And Survey Master

0
High
VulnerabilityCVE-2025-67987cvecve-2025-67987
Published: Fri Feb 20 2026 (02/20/2026, 15:46:31 UTC)
Source: CVE Database V5
Vendor/Project: ExpressTech Systems
Product: Quiz And Survey Master

Description

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in ExpressTech Systems Quiz And Survey Master quiz-master-next allows SQL Injection.This issue affects Quiz And Survey Master: from n/a through <= 10.3.1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 05:29:08 UTC

Technical Analysis

CVE-2025-67987 identifies an SQL Injection vulnerability in the ExpressTech Systems Quiz And Survey Master WordPress plugin, versions up to and including 10.3.1. The vulnerability stems from improper neutralization of special characters in SQL commands, which allows an attacker with authenticated access and low privileges to inject arbitrary SQL code. This can lead to unauthorized disclosure of sensitive data stored in the backend database, such as user information, survey results, or configuration details. The vulnerability does not require user interaction but does require the attacker to be authenticated, which limits exploitation scope but still poses a serious risk in multi-user environments. The CVSS 3.1 vector (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L) reflects network exploitability with low attack complexity, requiring privileges but no user interaction, and a high impact on confidentiality with limited impact on integrity and availability. Although no known exploits are currently reported in the wild, the widespread use of this plugin in educational, corporate, and research environments increases the potential attack surface. The vulnerability highlights the need for secure coding practices in handling SQL queries and input validation within WordPress plugins.

Potential Impact

The primary impact of CVE-2025-67987 is the potential unauthorized disclosure of sensitive data stored in the database, which can include personally identifiable information, survey responses, and internal configurations. This breach of confidentiality can lead to privacy violations, regulatory non-compliance, and reputational damage. Since the vulnerability requires authenticated access, insider threats or compromised user accounts pose a significant risk. The limited impact on integrity and availability reduces the risk of data manipulation or service disruption, but the confidentiality breach alone is critical. Organizations relying on Quiz And Survey Master for data collection and analysis could face data leaks that undermine trust and expose them to legal liabilities. The vulnerability's network accessibility and low complexity of exploitation mean attackers can leverage it remotely once authenticated, increasing the urgency for mitigation.

Mitigation Recommendations

To mitigate CVE-2025-67987, organizations should first restrict access to the Quiz And Survey Master plugin by limiting user roles and permissions to only trusted users. Implement strict authentication and monitoring to detect suspicious activities involving the plugin. Employ web application firewalls (WAFs) with custom rules to detect and block SQL injection attempts targeting this plugin. Regularly audit database queries and logs for anomalous patterns indicative of injection attempts. Since no official patch links are currently available, monitor ExpressTech Systems' advisories for updates and apply patches promptly once released. Additionally, consider isolating the database user account used by the plugin with minimal privileges to limit data exposure in case of exploitation. Educate administrators and users about the risks of SQL injection and enforce secure coding practices for any customizations involving database interactions.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-15T10:00:33.670Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6998c9eabe58cf853bab8353

Added to database: 2/20/2026, 8:54:02 PM

Last enriched: 4/3/2026, 5:29:08 AM

Last updated: 4/7/2026, 8:28:54 AM

Views: 33

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses