WordPress Plugin Vulnerabilities

Quiz And Survey Master < 7.1.14 - Authenticated SQL injection via Rest API

Description

While confirming https://wpscan.com/vulnerability/3b52b25c-82a1-41c7-83ac-92e244f7c5ab, another SQLi issue was identified and reported. The qsm_rest_get_bank_questions() function in the php/rest-api.php file did not property sanitise and escape the category parameter before using it in SQL statements passed to the get_row() and get_results() DB calls, allowing users with the edit_post capability (author+) to perform SQL injections.

Other SQLi issues were also identified by the WordPress plugin team

Proof of Concept

Affects Plugins

Fixed in 7.1.14

References

Classification

Type
SQLI
OWASP top 10
CWE
CVSS

Miscellaneous

Original Researcher
WPScanTeam
Verified
Yes

Timeline

Publicly Published
2021-03-26 (about 4 years ago)
Added
2021-03-26 (about 4 years ago)
Last Updated
2021-03-26 (about 4 years ago)

Other