Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9637: CWE-862 Missing Authorization in expresstech Quiz and Survey Master (QSM) – Easy Quiz and Survey Maker

0
Medium
VulnerabilityCVE-2025-9637cvecve-2025-9637cwe-862
Published: Tue Jan 06 2026 (01/06/2026, 09:20:58 UTC)
Source: CVE Database V5
Vendor/Project: expresstech
Product: Quiz and Survey Master (QSM) – Easy Quiz and Survey Maker

Description

The Quiz and Survey Master (QSM) – Easy Quiz and Survey Maker plugin for WordPress is vulnerable to unauthorized access and modification of data due to a missing capability and status checks on multiple functions in all versions up to, and including, 10.3.1. This makes it possible for unauthenticated attackers to view the details of unpublished, private, or password-protected quizzes, as well as submit file responses to questions from those quizzes, which allow file upload.

AI-Powered Analysis

AILast updated: 01/06/2026, 09:52:13 UTC

Technical Analysis

CVE-2025-9637 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the Quiz and Survey Master (QSM) – Easy Quiz and Survey Maker WordPress plugin developed by expresstech. The vulnerability exists in all versions up to and including 10.3.1 due to missing capability and status checks on multiple functions. This flaw allows unauthenticated attackers to bypass authorization controls and access sensitive quiz data that should be restricted, including unpublished, private, or password-protected quizzes. Furthermore, attackers can submit file responses to quiz questions, effectively enabling unauthorized file uploads. The lack of proper authorization checks means that no authentication or user interaction is required, and the attack can be executed remotely over the network. The CVSS v3.1 base score is 6.5 (medium severity), reflecting low complexity and no required privileges but limited impact on availability. The vulnerability compromises confidentiality by exposing sensitive quiz content and integrity by allowing unauthorized data modification through file uploads. Although no public exploits are known at this time, the potential for abuse exists, especially on websites relying on QSM for sensitive data collection or internal surveys. The absence of patch links suggests that fixes may not yet be publicly available, underscoring the need for interim mitigations.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized disclosure of sensitive or confidential survey and quiz data, potentially exposing internal assessments, employee feedback, or customer information. The ability to upload files without authorization raises the risk of malicious payload delivery, including web shells or malware, which could lead to further compromise of the hosting environment. Organizations using QSM for internal or customer-facing applications may face reputational damage, regulatory compliance issues (e.g., GDPR violations due to data exposure), and operational disruptions if attackers leverage uploaded files for lateral movement or persistence. The medium severity rating reflects that while availability is not directly impacted, the confidentiality and integrity breaches can have significant consequences, especially in sectors handling sensitive data such as finance, healthcare, and government. The vulnerability’s ease of exploitation and lack of authentication requirements increase the risk of automated scanning and exploitation attempts, making timely mitigation critical.

Mitigation Recommendations

1. Monitor for official patches or updates from expresstech and apply them immediately once released. 2. Until patches are available, restrict access to the QSM plugin’s quiz management interfaces using web server access controls or IP whitelisting. 3. Implement strict file upload restrictions by configuring allowed file types and size limits within the plugin settings or via additional security plugins. 4. Deploy a Web Application Firewall (WAF) with custom rules to detect and block unauthorized access attempts and suspicious file upload patterns targeting QSM endpoints. 5. Conduct regular security audits and scanning of WordPress installations to detect unauthorized files or modifications. 6. Educate site administrators on the risks of using outdated plugins and encourage timely updates. 7. Consider temporarily disabling the QSM plugin if it is not critical to operations until a secure version is available. 8. Review and harden WordPress user roles and permissions to minimize exposure from other potential vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-08-28T20:48:10.672Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695cd7ee3839e4417504db34

Added to database: 1/6/2026, 9:37:50 AM

Last enriched: 1/6/2026, 9:52:13 AM

Last updated: 1/8/2026, 10:25:14 AM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats