CVE-2025-6174
Description
The Qwizcards | online quizzes and flashcards WordPress plugin through 3.9.4 does not sanitise and escape the "_stylesheet" parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin or any other user.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The Qwizcards WordPress plugin ≤ 3.9.4 lacks sanitization of the _stylesheet parameter, enabling reflected XSS against high-privilege users like admins.
The Qwizcards | online quizzes and flashcards plugin for WordPress, through version 3.9.4, contains a reflected Cross-Site Scripting (XSS) vulnerability. The plugin fails to sanitize and escape the _stylesheet parameter before outputting it back in the page, allowing an attacker to inject arbitrary JavaScript code [1]. This flaw stems from insufficient input validation on a theme-related parameter.
An attacker can exploit this vulnerability by crafting a malicious URL that includes a payload in the _stylesheet parameter and tricking a high-privilege user, such as an administrator, into clicking it. No authentication on the attacker's part is required beyond the ability to deliver the link. The attack surface is accessible via any page that processes this parameter, making it a straightforward reflected XSS vector [1].
Successful exploitation allows the attacker to execute arbitrary JavaScript in the context of the victim's browser session. Because the vulnerability can target high-privilege users, an attacker could potentially perform actions like creating new admin accounts, modifying plugin settings, or injecting malicious content into the site, effectively compromising the entire WordPress installation [1].
The vulnerability has been fixed in version 3.95 of the plugin. Users are strongly advised to update to the latest version immediately. The issue was publicly disclosed on July 2, 2025, and assigned CVE-2025-6174 with a CVSS v3 base score of 6.1 (Medium severity). No workarounds have been documented beyond applying the patch [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: <=3.9.4
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.