CVE-2025-48095

5.9 MEDIUM

📋 TL;DR

This stored XSS vulnerability in the Survey Maker WordPress plugin allows attackers to inject malicious scripts into survey content. When users view compromised surveys, the scripts execute in their browsers, potentially stealing session cookies or performing actions on their behalf. All WordPress sites running Survey Maker version 5.1.8.8 or earlier are affected.

💻 Affected Systems

Products:
  • Survey Maker WordPress Plugin
Versions: All versions up to and including 5.1.8.8
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the Survey Maker plugin to be installed and active on a WordPress site.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could steal administrator session cookies, take over WordPress sites, deface content, or redirect users to malicious sites.

🟠

Likely Case

Attackers inject malicious JavaScript into surveys to steal user session data or credentials from visitors viewing compromised surveys.

🟢

If Mitigated

With proper input validation and output encoding, malicious scripts would be neutralized before reaching users' browsers.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to create or edit surveys, which typically requires contributor-level access or higher.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 5.1.8.8

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/survey-maker/vulnerability/wordpress-survey-maker-plugin-5-1-8-8-cross-site-scripting-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Survey Maker and click 'Update Now'. 4. Verify update completes successfully.

🔧 Temporary Workarounds

Disable Survey Maker Plugin

WordPress

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate survey-maker

Restrict User Roles

WordPress

Limit survey creation/editing to trusted administrators only

🧯 If You Can't Patch

  • Implement a Web Application Firewall (WAF) with XSS protection rules
  • Disable JavaScript execution in survey content areas using Content Security Policy headers

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Plugins > Survey Maker for version number. If version is 5.1.8.8 or lower, you are vulnerable.

Check Version:

wp plugin get survey-maker --field=version

Verify Fix Applied:

After updating, verify Survey Maker version is higher than 5.1.8.8 in WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual survey creation/modification patterns
  • JavaScript payloads in survey content fields

Network Indicators:

  • Unexpected JavaScript loading from survey pages
  • Suspicious outbound connections from survey pages

SIEM Query:

source="wordpress" AND (event="plugin_update" AND plugin="survey-maker") OR (event="survey_modified" AND user_agent CONTAINS suspicious)

🔗 References

📤 Share & Export