VYPR
Medium severity6.1NVD Advisory· Published Jul 23, 2025· Updated Apr 15, 2026

CVE-2025-6174

CVE-2025-6174

Description

The Qwizcards | online quizzes and flashcards WordPress plugin through 3.9.4 does not sanitise and escape the "_stylesheet" parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin or any other user.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

The Qwizcards WordPress plugin ≤ 3.9.4 lacks sanitization of the _stylesheet parameter, enabling reflected XSS against high-privilege users like admins.

The Qwizcards | online quizzes and flashcards plugin for WordPress, through version 3.9.4, contains a reflected Cross-Site Scripting (XSS) vulnerability. The plugin fails to sanitize and escape the _stylesheet parameter before outputting it back in the page, allowing an attacker to inject arbitrary JavaScript code [1]. This flaw stems from insufficient input validation on a theme-related parameter.

An attacker can exploit this vulnerability by crafting a malicious URL that includes a payload in the _stylesheet parameter and tricking a high-privilege user, such as an administrator, into clicking it. No authentication on the attacker's part is required beyond the ability to deliver the link. The attack surface is accessible via any page that processes this parameter, making it a straightforward reflected XSS vector [1].

Successful exploitation allows the attacker to execute arbitrary JavaScript in the context of the victim's browser session. Because the vulnerability can target high-privilege users, an attacker could potentially perform actions like creating new admin accounts, modifying plugin settings, or injecting malicious content into the site, effectively compromising the entire WordPress installation [1].

The vulnerability has been fixed in version 3.95 of the plugin. Users are strongly advised to update to the latest version immediately. The issue was publicly disclosed on July 2, 2025, and assigned CVE-2025-6174 with a CVSS v3 base score of 6.1 (Medium severity). No workarounds have been documented beyond applying the patch [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.