Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9294: CWE-285 Improper Authorization in expresstech Quiz and Survey Master (QSM) – Easy Quiz and Survey Maker

0
Medium
VulnerabilityCVE-2025-9294cvecve-2025-9294cwe-285
Published: Tue Jan 06 2026 (01/06/2026, 08:21:49 UTC)
Source: CVE Database V5
Vendor/Project: expresstech
Product: Quiz and Survey Master (QSM) – Easy Quiz and Survey Maker

Description

The Quiz and Survey Master (QSM) – Easy Quiz and Survey Maker plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the qsm_dashboard_delete_result function in all versions up to, and including, 10.3.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete quiz results.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 17:49:50 UTC

Technical Analysis

CVE-2025-9294 identifies an improper authorization vulnerability (CWE-285) in the Quiz and Survey Master (QSM) – Easy Quiz and Survey Maker WordPress plugin developed by expresstech. The vulnerability exists in the qsm_dashboard_delete_result function, which lacks a proper capability check to verify if the authenticated user has sufficient privileges to delete quiz results. This flaw affects all plugin versions up to and including 10.3.1. As a result, any authenticated user with Subscriber-level access or higher can exploit this vulnerability to delete quiz results, bypassing intended access controls. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network. The CVSS v3.1 base score is 4.3 (medium), reflecting low complexity of attack (AC:L), network attack vector (AV:N), and limited impact on integrity only (I:L) without affecting confidentiality or availability. No patches or fixes are currently linked, and no known exploits have been reported in the wild. This vulnerability primarily threatens data integrity by enabling unauthorized deletion of quiz results, which could disrupt data reliability and reporting for organizations relying on QSM for assessments or surveys.

Potential Impact

The primary impact of CVE-2025-9294 is unauthorized modification of data integrity through deletion of quiz results. Organizations using the QSM plugin for assessments, surveys, or data collection may experience loss of critical data, leading to inaccurate reporting, compromised decision-making, and potential disruption of business processes relying on quiz outcomes. While confidentiality and availability are not directly affected, the integrity loss can undermine trust in the system and cause operational inefficiencies. Attackers with low-level authenticated access (Subscriber or higher) can exploit this vulnerability without elevated privileges, increasing the risk from insider threats or compromised low-privilege accounts. Although no known exploits are currently reported, the ease of exploitation and widespread use of WordPress and QSM plugin globally could lead to future attacks targeting educational institutions, businesses, and organizations that rely on quiz data for analytics or compliance.

Mitigation Recommendations

To mitigate CVE-2025-9294, organizations should immediately restrict user roles and permissions to minimize the number of users with Subscriber-level or higher access unless necessary. Implement strict access control policies and regularly audit user privileges to detect and remove unnecessary accounts. Monitor logs for unusual deletion activities related to quiz results. Since no official patch is currently available, consider temporarily disabling the QSM plugin or restricting access to the quiz results management interface to trusted administrators only. For developers or site administrators with technical capability, apply custom code to enforce capability checks on the qsm_dashboard_delete_result function as a temporary workaround. Stay alert for official patches or updates from expresstech and apply them promptly once released. Additionally, maintain regular backups of quiz data to enable recovery in case of unauthorized deletions.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-08-20T22:35:45.725Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695cc9de3839e44175ff5dc8

Added to database: 1/6/2026, 8:37:50 AM

Last enriched: 2/26/2026, 5:49:50 PM

Last updated: 3/26/2026, 7:52:09 AM

Views: 86

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses