Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2412: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in expresstech Quiz and Survey Master (QSM) – Easy Quiz and Survey Maker

0
Medium
VulnerabilityCVE-2026-2412cvecve-2026-2412cwe-89
Published: Mon Mar 23 2026 (03/23/2026, 22:25:39 UTC)
Source: CVE Database V5
Vendor/Project: expresstech
Product: Quiz and Survey Master (QSM) – Easy Quiz and Survey Maker

Description

CVE-2026-2412 is a medium-severity SQL Injection vulnerability in the Quiz and Survey Master (QSM) WordPress plugin versions up to 10. 3. 5. It arises from improper sanitization of the 'merged_question' parameter, allowing authenticated users with Contributor-level access or higher to inject SQL code. The vulnerability stems from the use of sanitize_text_field() which does not prevent SQL metacharacters, combined with unsafe concatenation into SQL IN() clauses without parameterized queries or proper type casting. Exploitation can lead to unauthorized disclosure of sensitive database information. No known exploits are currently in the wild. Mitigation requires patching or applying secure coding practices such as using $wpdb->prepare() and strict input validation. This threat primarily affects WordPress sites using QSM, which are widespread globally, with higher risk in countries with large WordPress user bases and active contributor communities. The CVSS score is 6.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 00:06:06 UTC

Technical Analysis

CVE-2026-2412 is a SQL Injection vulnerability identified in the Quiz and Survey Master (QSM) plugin for WordPress, affecting all versions up to and including 10.3.5. The vulnerability is caused by improper neutralization of special SQL elements in the 'merged_question' parameter. Although the plugin applies the sanitize_text_field() function to this parameter, this function does not adequately filter out SQL metacharacters such as parentheses, OR, AND, and comment symbols (#). The parameter value is then directly concatenated into a SQL IN() clause without using WordPress's $wpdb->prepare() method or casting values to integers, which are standard practices to prevent SQL Injection. This flaw allows an authenticated attacker with Contributor-level privileges or higher to inject arbitrary SQL code into existing queries. Such injection can be leveraged to extract sensitive information from the database, compromising confidentiality. The vulnerability does not affect data integrity or availability, and no user interaction beyond authentication is required. No public exploits have been reported yet, but the vulnerability is publicly disclosed and assigned a CVSS 3.1 base score of 6.5 (medium severity). The plugin is widely used in WordPress environments, making the attack surface significant. The root cause is insecure coding practices around input sanitization and query construction in the plugin's handling of user input.

Potential Impact

The primary impact of CVE-2026-2412 is unauthorized disclosure of sensitive information stored in the WordPress database via SQL Injection. Attackers with Contributor-level access can exploit this vulnerability to extract data beyond their normal permissions, potentially accessing user data, site configuration, or other confidential information. While the vulnerability does not allow modification or deletion of data (no integrity or availability impact), the confidentiality breach can lead to further attacks such as privilege escalation, identity theft, or targeted phishing. Organizations running WordPress sites with the vulnerable QSM plugin are at risk, especially those with multiple contributors or less stringent access controls. The attack requires authenticated access, which limits exposure but does not eliminate risk, as Contributor accounts are common in collaborative environments. The widespread use of WordPress and QSM increases the potential scale of impact globally. Additionally, sensitive sectors such as education, media, and business that rely on quizzes and surveys for data collection may face reputational damage and compliance issues if data is leaked.

Mitigation Recommendations

To mitigate CVE-2026-2412, organizations should immediately update the Quiz and Survey Master plugin to a patched version once available. In the absence of an official patch, site administrators should restrict Contributor-level access and above to trusted users only. Developers maintaining custom versions of the plugin should refactor the vulnerable code by replacing direct concatenation of the 'merged_question' parameter with parameterized queries using $wpdb->prepare() or by strictly casting inputs to integers before inclusion in SQL queries. Additionally, implement rigorous input validation and sanitization beyond sanitize_text_field(), specifically filtering out SQL metacharacters. Employ Web Application Firewalls (WAFs) with SQL Injection detection rules to provide an additional layer of defense. Regularly audit user roles and permissions to minimize the number of users with Contributor or higher privileges. Monitoring database query logs for unusual patterns can help detect exploitation attempts early. Finally, educate developers and administrators about secure coding practices and the risks of SQL Injection in WordPress plugins.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-02-12T16:12:41.339Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c1d4a9f4197a8e3ba0b478

Added to database: 3/24/2026, 12:02:49 AM

Last enriched: 3/24/2026, 12:06:06 AM

Last updated: 3/24/2026, 4:41:37 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses