CVE-2025-9294: CWE-285 Improper Authorization in expresstech Quiz and Survey Master (QSM) – Easy Quiz and Survey Maker
The Quiz and Survey Master (QSM) – Easy Quiz and Survey Maker plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the qsm_dashboard_delete_result function in all versions up to, and including, 10.3.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete quiz results.
AI Analysis
Technical Summary
CVE-2025-9294 identifies an improper authorization vulnerability (CWE-285) in the Quiz and Survey Master (QSM) – Easy Quiz and Survey Maker WordPress plugin developed by expresstech. The vulnerability exists in the qsm_dashboard_delete_result function, which lacks a proper capability check to verify if the authenticated user has sufficient privileges to delete quiz results. This flaw affects all plugin versions up to and including 10.3.1. As a result, any authenticated user with Subscriber-level access or higher can exploit this vulnerability to delete quiz results, bypassing intended access controls. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network. The CVSS v3.1 base score is 4.3 (medium), reflecting low complexity of attack (AC:L), network attack vector (AV:N), and limited impact on integrity only (I:L) without affecting confidentiality or availability. No patches or fixes are currently linked, and no known exploits have been reported in the wild. This vulnerability primarily threatens data integrity by enabling unauthorized deletion of quiz results, which could disrupt data reliability and reporting for organizations relying on QSM for assessments or surveys.
Potential Impact
The primary impact of CVE-2025-9294 is unauthorized modification of data integrity through deletion of quiz results. Organizations using the QSM plugin for assessments, surveys, or data collection may experience loss of critical data, leading to inaccurate reporting, compromised decision-making, and potential disruption of business processes relying on quiz outcomes. While confidentiality and availability are not directly affected, the integrity loss can undermine trust in the system and cause operational inefficiencies. Attackers with low-level authenticated access (Subscriber or higher) can exploit this vulnerability without elevated privileges, increasing the risk from insider threats or compromised low-privilege accounts. Although no known exploits are currently reported, the ease of exploitation and widespread use of WordPress and QSM plugin globally could lead to future attacks targeting educational institutions, businesses, and organizations that rely on quiz data for analytics or compliance.
Mitigation Recommendations
To mitigate CVE-2025-9294, organizations should immediately restrict user roles and permissions to minimize the number of users with Subscriber-level or higher access unless necessary. Implement strict access control policies and regularly audit user privileges to detect and remove unnecessary accounts. Monitor logs for unusual deletion activities related to quiz results. Since no official patch is currently available, consider temporarily disabling the QSM plugin or restricting access to the quiz results management interface to trusted administrators only. For developers or site administrators with technical capability, apply custom code to enforce capability checks on the qsm_dashboard_delete_result function as a temporary workaround. Stay alert for official patches or updates from expresstech and apply them promptly once released. Additionally, maintain regular backups of quiz data to enable recovery in case of unauthorized deletions.
Affected Countries
United States, United Kingdom, Germany, India, Australia, Canada, Brazil, France, Netherlands, Japan
CVE-2025-9294: CWE-285 Improper Authorization in expresstech Quiz and Survey Master (QSM) – Easy Quiz and Survey Maker
Description
The Quiz and Survey Master (QSM) – Easy Quiz and Survey Maker plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the qsm_dashboard_delete_result function in all versions up to, and including, 10.3.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete quiz results.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-9294 identifies an improper authorization vulnerability (CWE-285) in the Quiz and Survey Master (QSM) – Easy Quiz and Survey Maker WordPress plugin developed by expresstech. The vulnerability exists in the qsm_dashboard_delete_result function, which lacks a proper capability check to verify if the authenticated user has sufficient privileges to delete quiz results. This flaw affects all plugin versions up to and including 10.3.1. As a result, any authenticated user with Subscriber-level access or higher can exploit this vulnerability to delete quiz results, bypassing intended access controls. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network. The CVSS v3.1 base score is 4.3 (medium), reflecting low complexity of attack (AC:L), network attack vector (AV:N), and limited impact on integrity only (I:L) without affecting confidentiality or availability. No patches or fixes are currently linked, and no known exploits have been reported in the wild. This vulnerability primarily threatens data integrity by enabling unauthorized deletion of quiz results, which could disrupt data reliability and reporting for organizations relying on QSM for assessments or surveys.
Potential Impact
The primary impact of CVE-2025-9294 is unauthorized modification of data integrity through deletion of quiz results. Organizations using the QSM plugin for assessments, surveys, or data collection may experience loss of critical data, leading to inaccurate reporting, compromised decision-making, and potential disruption of business processes relying on quiz outcomes. While confidentiality and availability are not directly affected, the integrity loss can undermine trust in the system and cause operational inefficiencies. Attackers with low-level authenticated access (Subscriber or higher) can exploit this vulnerability without elevated privileges, increasing the risk from insider threats or compromised low-privilege accounts. Although no known exploits are currently reported, the ease of exploitation and widespread use of WordPress and QSM plugin globally could lead to future attacks targeting educational institutions, businesses, and organizations that rely on quiz data for analytics or compliance.
Mitigation Recommendations
To mitigate CVE-2025-9294, organizations should immediately restrict user roles and permissions to minimize the number of users with Subscriber-level or higher access unless necessary. Implement strict access control policies and regularly audit user privileges to detect and remove unnecessary accounts. Monitor logs for unusual deletion activities related to quiz results. Since no official patch is currently available, consider temporarily disabling the QSM plugin or restricting access to the quiz results management interface to trusted administrators only. For developers or site administrators with technical capability, apply custom code to enforce capability checks on the qsm_dashboard_delete_result function as a temporary workaround. Stay alert for official patches or updates from expresstech and apply them promptly once released. Additionally, maintain regular backups of quiz data to enable recovery in case of unauthorized deletions.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-08-20T22:35:45.725Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695cc9de3839e44175ff5dc8
Added to database: 1/6/2026, 8:37:50 AM
Last enriched: 2/26/2026, 5:49:50 PM
Last updated: 3/26/2026, 7:52:09 AM
Views: 86
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.