SQL injection bug in Quiz and Survey Master puts 40,000 WordPress sites at risk

March 23, 20262 min read2 sources
Share:
SQL injection bug in Quiz and Survey Master puts 40,000 WordPress sites at risk

A SQL injection vulnerability in the WordPress plugin Quiz and Survey Master (QSM) affects roughly 40,000 sites, according to a report by Infosecurity Magazine. The flaw could let attackers interfere with database queries on vulnerable installations, creating a path to data theft, content tampering, or broader site compromise depending on how the plugin is deployed and what database permissions are available.

QSM is used to build quizzes, surveys and tests on WordPress sites. Security issues in plugins like this can have outsized reach because one bug can expose thousands of websites at once. In this case, the concern is not WordPress core but a third-party plugin with a large install base.

Infosecurity Magazine reported the issue as an SQL injection flaw but did not, in the cited item, provide full technical details such as the exact vulnerable version range, whether the bug requires authentication, or whether active exploitation has been observed. Those details matter: unauthenticated SQL injection flaws are generally more dangerous because they can be triggered remotely without a valid account.

Even without confirmed exploitation, SQL injection remains one of the most serious web application weaknesses. In WordPress environments, plugin-level SQL injection can expose usernames, email addresses, password hashes, stored survey responses and other site data. In worse cases, attackers may be able to alter site settings, inject malicious content or create administrator-level access through database manipulation.

Site owners using Quiz and Survey Master should review the plugin's changelog, update immediately to the latest available version, and check web and database logs for suspicious requests to plugin-related endpoints. Administrators should also review for unexpected user accounts, content changes and signs of follow-on abuse. Organizations managing multiple WordPress properties should verify whether QSM is installed anywhere in their estate and prioritize patching exposed systems.

The incident is another reminder that plugin security remains one of the biggest risks in the WordPress ecosystem, where a single coding flaw can quickly become a mass-exposure problem across thousands of sites.

Share:

// SOURCES

// RELATED

Trivy hack spreads infostealer via Docker, triggers worm and Kubernetes wiper

A hypothetical supply chain attack on the Trivy security scanner via Docker Hub highlights a severe threat involving an infostealer, worm, and a Kuber

6 min readApr 1

We found eight attack vectors inside AWS Bedrock. Here's what attackers can do with them

Security researchers have uncovered eight critical attack vectors in AWS Bedrock, Amazon's AI platform, revealing how its deep enterprise integration

7 min readApr 1

Hackers now exploit critical F5 BIG-IP flaw in attacks, patch now

F5 reclassified a BIG-IP flaw as a critical RCE vulnerability, CVE-2023-46747, now actively exploited to deploy webshells. Immediate patching is vital

5 min readApr 1

The AI arms race: why unified exposure management is becoming a boardroom priority

The weaponization of AI is accelerating the speed and sophistication of cyberattacks. This analysis explores why a proactive Unified Exposure Manageme

6 min readApr 1