CVE-2025-68594

8.1 HIGH

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the Opinion Stage Poll, Survey & Quiz Maker WordPress plugin that allows attackers to bypass access controls. Attackers can exploit incorrectly configured security levels to perform unauthorized actions. All WordPress sites running affected plugin versions are vulnerable.

💻 Affected Systems

Products:
  • Poll, Survey & Quiz Maker Plugin by Opinion Stage (social-polls-by-opinionstage)
Versions: All versions up to and including 19.12.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with this specific plugin installed and activated.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site compromise through privilege escalation, data manipulation, or unauthorized administrative actions leading to data breach or site takeover.

🟠

Likely Case

Unauthorized access to poll/survey data, manipulation of voting results, or injection of malicious content into polls/surveys.

🟢

If Mitigated

Limited impact with proper network segmentation and minimal plugin permissions, though vulnerability still exists.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some level of access but authorization checks are missing, making exploitation straightforward once initial access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 19.12.1

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/social-polls-by-opinionstage/vulnerability/wordpress-poll-survey-quiz-maker-plugin-by-opinion-stage-plugin-19-12-1-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Poll, Survey & Quiz Maker Plugin by Opinion Stage'. 4. Click 'Update Now' if available. 5. Alternatively, download latest version from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patching is possible

wp plugin deactivate social-polls-by-opinionstage

Restrict Access

linux

Implement IP-based restrictions to plugin admin pages

Add to .htaccess: Order Deny,Allow
Deny from all
Allow from 192.168.1.0/24

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate WordPress installation
  • Apply principle of least privilege to all WordPress user accounts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for 'Poll, Survey & Quiz Maker Plugin by Opinion Stage' version

Check Version:

wp plugin get social-polls-by-opinionstage --field=version

Verify Fix Applied:

Verify plugin version is greater than 19.12.1 in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to plugin admin endpoints
  • Unusual poll/survey data modifications

Network Indicators:

  • HTTP requests to /wp-admin/admin-ajax.php with plugin-specific actions
  • Unusual traffic to plugin API endpoints

SIEM Query:

source="wordpress.log" AND (uri_path="/wp-admin/admin-ajax.php" AND action CONTAINS "opinionstage")

🔗 References

📤 Share & Export