Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsSQL Injection Flaw Affects 40,000 WordPress Sites
SQL Injection Flaw Affects 40,000 WordPress Sites
Cybersecurity

SQL Injection Flaw Affects 40,000 WordPress Sites

•February 3, 2026
0
Infosecurity Magazine
Infosecurity Magazine•Feb 3, 2026

Companies Mentioned

Patchstack

Patchstack

Why It Matters

The vulnerability shows how low‑privilege accounts can compromise WordPress sites, prompting urgent patch adoption and heightened security reviews for plugins. It also highlights the broader risk of insufficient input validation in the WordPress ecosystem.

Key Takeaways

  • •Over 40,000 sites vulnerable via Quiz and Survey Master plugin.
  • •Vulnerability exploited by any logged‑in user, not just admins.
  • •Flaw stemmed from unsanitized `_is_linking_` REST API parameter.
  • •Patch released in version 10.3.2 fixes issue with intval.
  • •Incident underscores need for input validation and prepared statements.

Pulse Analysis

WordPress powers roughly 43 % of all websites, and its extensibility hinges on a massive ecosystem of third‑party plugins. Quiz and Survey Master (QSM) is among the most installed plugins, enabling marketers and educators to embed interactive quizzes, surveys, and forms without coding. The recent discovery of a SQL injection flaw in QSM—identified as CVE‑2025‑67987—exposed more than 40,000 active sites to data‑theft or manipulation risks. Because the vulnerability existed in versions up to 10.3.1, many operators were unknowingly running insecure software, underscoring how a single plugin can become a systemic attack vector across the WordPress landscape.

The defect originated in a REST‑API endpoint that retrieves quiz question data. The `_is_linking_` request parameter was treated as a numeric identifier but was concatenated directly into an SQL statement without any sanitisation or use of prepared statements. An attacker with merely a Subscriber‑level account could supply crafted input containing additional SQL commands, causing the database engine to execute unintended queries. This classic injection scenario bypasses the usual privilege barrier, allowing unauthorized read or write operations on the site’s underlying MySQL tables, and illustrates the danger of trusting user‑supplied data in server‑side code.

Patchstack’s responsible disclosure led to a rapid fix: version 10.3.2 now casts `_is_linking_` to an integer via `intval`, effectively blocking malicious payloads. The episode reinforces two best‑practice imperatives for the WordPress community. First, plugin developers must adopt parameterised queries and rigorous input validation as default coding standards. Second, site administrators should maintain an aggressive patch‑management cadence, monitoring vulnerability feeds and applying updates promptly. As the WordPress ecosystem continues to expand, the QSM incident serves as a cautionary reminder that even low‑privilege users can become vectors for high‑impact exploits if foundational security controls are neglected.

SQL Injection Flaw Affects 40,000 WordPress Sites

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...