CVE-2026-2412: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in expresstech Quiz and Survey Master (QSM) – Easy Quiz and Survey Maker
CVE-2026-2412 is a medium-severity SQL Injection vulnerability in the Quiz and Survey Master (QSM) WordPress plugin versions up to 10. 3. 5. It arises from improper sanitization of the 'merged_question' parameter, allowing authenticated users with Contributor-level access or higher to inject SQL code. The vulnerability stems from the use of sanitize_text_field() which does not prevent SQL metacharacters, combined with unsafe concatenation into SQL IN() clauses without parameterized queries or proper type casting. Exploitation can lead to unauthorized disclosure of sensitive database information. No known exploits are currently in the wild. Mitigation requires patching or applying secure coding practices such as using $wpdb->prepare() and strict input validation. This threat primarily affects WordPress sites using QSM, which are widespread globally, with higher risk in countries with large WordPress user bases and active contributor communities. The CVSS score is 6.
AI Analysis
Technical Summary
CVE-2026-2412 is a SQL Injection vulnerability identified in the Quiz and Survey Master (QSM) plugin for WordPress, affecting all versions up to and including 10.3.5. The vulnerability is caused by improper neutralization of special SQL elements in the 'merged_question' parameter. Although the plugin applies the sanitize_text_field() function to this parameter, this function does not adequately filter out SQL metacharacters such as parentheses, OR, AND, and comment symbols (#). The parameter value is then directly concatenated into a SQL IN() clause without using WordPress's $wpdb->prepare() method or casting values to integers, which are standard practices to prevent SQL Injection. This flaw allows an authenticated attacker with Contributor-level privileges or higher to inject arbitrary SQL code into existing queries. Such injection can be leveraged to extract sensitive information from the database, compromising confidentiality. The vulnerability does not affect data integrity or availability, and no user interaction beyond authentication is required. No public exploits have been reported yet, but the vulnerability is publicly disclosed and assigned a CVSS 3.1 base score of 6.5 (medium severity). The plugin is widely used in WordPress environments, making the attack surface significant. The root cause is insecure coding practices around input sanitization and query construction in the plugin's handling of user input.
Potential Impact
The primary impact of CVE-2026-2412 is unauthorized disclosure of sensitive information stored in the WordPress database via SQL Injection. Attackers with Contributor-level access can exploit this vulnerability to extract data beyond their normal permissions, potentially accessing user data, site configuration, or other confidential information. While the vulnerability does not allow modification or deletion of data (no integrity or availability impact), the confidentiality breach can lead to further attacks such as privilege escalation, identity theft, or targeted phishing. Organizations running WordPress sites with the vulnerable QSM plugin are at risk, especially those with multiple contributors or less stringent access controls. The attack requires authenticated access, which limits exposure but does not eliminate risk, as Contributor accounts are common in collaborative environments. The widespread use of WordPress and QSM increases the potential scale of impact globally. Additionally, sensitive sectors such as education, media, and business that rely on quizzes and surveys for data collection may face reputational damage and compliance issues if data is leaked.
Mitigation Recommendations
To mitigate CVE-2026-2412, organizations should immediately update the Quiz and Survey Master plugin to a patched version once available. In the absence of an official patch, site administrators should restrict Contributor-level access and above to trusted users only. Developers maintaining custom versions of the plugin should refactor the vulnerable code by replacing direct concatenation of the 'merged_question' parameter with parameterized queries using $wpdb->prepare() or by strictly casting inputs to integers before inclusion in SQL queries. Additionally, implement rigorous input validation and sanitization beyond sanitize_text_field(), specifically filtering out SQL metacharacters. Employ Web Application Firewalls (WAFs) with SQL Injection detection rules to provide an additional layer of defense. Regularly audit user roles and permissions to minimize the number of users with Contributor or higher privileges. Monitoring database query logs for unusual patterns can help detect exploitation attempts early. Finally, educate developers and administrators about secure coding practices and the risks of SQL Injection in WordPress plugins.
Affected Countries
United States, India, Germany, United Kingdom, Canada, Australia, Brazil, France, Japan, Netherlands, Italy, Spain
CVE-2026-2412: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in expresstech Quiz and Survey Master (QSM) – Easy Quiz and Survey Maker
Description
CVE-2026-2412 is a medium-severity SQL Injection vulnerability in the Quiz and Survey Master (QSM) WordPress plugin versions up to 10. 3. 5. It arises from improper sanitization of the 'merged_question' parameter, allowing authenticated users with Contributor-level access or higher to inject SQL code. The vulnerability stems from the use of sanitize_text_field() which does not prevent SQL metacharacters, combined with unsafe concatenation into SQL IN() clauses without parameterized queries or proper type casting. Exploitation can lead to unauthorized disclosure of sensitive database information. No known exploits are currently in the wild. Mitigation requires patching or applying secure coding practices such as using $wpdb->prepare() and strict input validation. This threat primarily affects WordPress sites using QSM, which are widespread globally, with higher risk in countries with large WordPress user bases and active contributor communities. The CVSS score is 6.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-2412 is a SQL Injection vulnerability identified in the Quiz and Survey Master (QSM) plugin for WordPress, affecting all versions up to and including 10.3.5. The vulnerability is caused by improper neutralization of special SQL elements in the 'merged_question' parameter. Although the plugin applies the sanitize_text_field() function to this parameter, this function does not adequately filter out SQL metacharacters such as parentheses, OR, AND, and comment symbols (#). The parameter value is then directly concatenated into a SQL IN() clause without using WordPress's $wpdb->prepare() method or casting values to integers, which are standard practices to prevent SQL Injection. This flaw allows an authenticated attacker with Contributor-level privileges or higher to inject arbitrary SQL code into existing queries. Such injection can be leveraged to extract sensitive information from the database, compromising confidentiality. The vulnerability does not affect data integrity or availability, and no user interaction beyond authentication is required. No public exploits have been reported yet, but the vulnerability is publicly disclosed and assigned a CVSS 3.1 base score of 6.5 (medium severity). The plugin is widely used in WordPress environments, making the attack surface significant. The root cause is insecure coding practices around input sanitization and query construction in the plugin's handling of user input.
Potential Impact
The primary impact of CVE-2026-2412 is unauthorized disclosure of sensitive information stored in the WordPress database via SQL Injection. Attackers with Contributor-level access can exploit this vulnerability to extract data beyond their normal permissions, potentially accessing user data, site configuration, or other confidential information. While the vulnerability does not allow modification or deletion of data (no integrity or availability impact), the confidentiality breach can lead to further attacks such as privilege escalation, identity theft, or targeted phishing. Organizations running WordPress sites with the vulnerable QSM plugin are at risk, especially those with multiple contributors or less stringent access controls. The attack requires authenticated access, which limits exposure but does not eliminate risk, as Contributor accounts are common in collaborative environments. The widespread use of WordPress and QSM increases the potential scale of impact globally. Additionally, sensitive sectors such as education, media, and business that rely on quizzes and surveys for data collection may face reputational damage and compliance issues if data is leaked.
Mitigation Recommendations
To mitigate CVE-2026-2412, organizations should immediately update the Quiz and Survey Master plugin to a patched version once available. In the absence of an official patch, site administrators should restrict Contributor-level access and above to trusted users only. Developers maintaining custom versions of the plugin should refactor the vulnerable code by replacing direct concatenation of the 'merged_question' parameter with parameterized queries using $wpdb->prepare() or by strictly casting inputs to integers before inclusion in SQL queries. Additionally, implement rigorous input validation and sanitization beyond sanitize_text_field(), specifically filtering out SQL metacharacters. Employ Web Application Firewalls (WAFs) with SQL Injection detection rules to provide an additional layer of defense. Regularly audit user roles and permissions to minimize the number of users with Contributor or higher privileges. Monitoring database query logs for unusual patterns can help detect exploitation attempts early. Finally, educate developers and administrators about secure coding practices and the risks of SQL Injection in WordPress plugins.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-02-12T16:12:41.339Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69c1d4a9f4197a8e3ba0b478
Added to database: 3/24/2026, 12:02:49 AM
Last enriched: 3/24/2026, 12:06:06 AM
Last updated: 3/24/2026, 4:41:37 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.