{ "schema_version": "1.4.0", "id": "GHSA-5v4m-g3m7-229m", "modified": "2025-09-18T09:31:13Z", "published": "2025-09-18T09:31:13Z", "aliases": [ "CVE-2025-10493" ], "details": "The Chained Quiz plugin for WordPress is vulnerable to Insecure Direct Object Reference in version 1.3.4 and below via the quiz submission and completion mechanisms due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to hijack and modify other users' quiz attempts by manipulating the chained_completion_id cookie value, allowing them to alter quiz answers, scores, and results of any user. The vulnerability was partially patched in versions 1.3.4 and 1.3.5.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-10493" }, { "type": "WEB", "url": "https://plugins.trac.wordpress.org/browser/chained-quiz/tags/1.3.3/controllers/quizzes.php" }, { "type": "WEB", "url": "https://plugins.trac.wordpress.org/browser/chained-quiz/tags/1.3.3/models/quiz.php" }, { "type": "WEB", "url": "https://plugins.trac.wordpress.org/changeset/3362561" }, { "type": "WEB", "url": "https://plugins.trac.wordpress.org/changeset/3362701" }, { "type": "WEB", "url": "https://plugins.trac.wordpress.org/changeset/3362966" }, { "type": "WEB", "url": "https://www.wordfence.com/threat-intel/vulnerabilities/id/1d8f6965-1fe3-4f24-bd6b-9026e91bc5db?source=cve" } ], "database_specific": { "cwe_ids": [ "CWE-639" ], "severity": "MODERATE", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-09-18T07:15:59Z" } }