Vulnerability Description
An XSS issue was discovered in the slickquiz plugin through 1.3.7.1 for WordPress. The save_quiz_score functionality available via the /wp-admin/admin-ajax.php endpoint allows unauthenticated users to submit quiz solutions/answers, which are stored in the database and later shown in the WordPress backend for all users with at least Subscriber rights. Because the plugin does not properly validate and sanitize this data, a malicious payload in either the name or email field is executed directly within the backend at /wp-admin/admin.php?page=slickquiz across all users with the privileges of at least Subscriber.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Slickquiz Project | Slickquiz | <= 1.3.7.1 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/154439/WordPress-SlickQuiz-1.3.7.1-Cross-SiExploitThird Party AdvisoryVDB Entry
- https://wordpress.org/plugins/slickquiz/#developersProduct
- http://packetstormsecurity.com/files/154439/WordPress-SlickQuiz-1.3.7.1-Cross-SiExploitThird Party AdvisoryVDB Entry
- https://wordpress.org/plugins/slickquiz/#developersProduct
FAQ
What is CVE-2019-12517?
CVE-2019-12517 is a vulnerability with a CVSS score of 6.1 (MEDIUM). An XSS issue was discovered in the slickquiz plugin through 1.3.7.1 for WordPress. The save_quiz_score functionality available via the /wp-admin/admin-ajax.php endpoint allows unauthenticated users to...
How severe is CVE-2019-12517?
CVE-2019-12517 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-12517?
Check the references section above for vendor advisories and patch information. Affected products include: Slickquiz Project Slickquiz.