The Menu Image, Icons made easy WordPress plugin before 3.0.6 does not have authorisation and CSRF checks when saving menu settings, and does not validate, sanitise and escape them. As a result, any authenticate users, such as subscriber can update the settings or arbitrary menu and put Cross-Site Scripting payloads in them which will be triggered in the related menu in the frontend
References
| Link | Resource |
|---|---|
| https://wpscan.com/vulnerability/612f9273-acc8-4be6-b372-33f1e687f54a | Exploit Third Party Advisory |
Configurations
History
07 Nov 2023, 03:41
| Type | Values Removed | Values Added |
|---|---|---|
| CWE |
04 Jul 2023, 09:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | The Menu Image, Icons made easy WordPress plugin before 3.0.6 does not have authorisation and CSRF checks when saving menu settings, and does not validate, sanitise and escape them. As a result, any authenticate users, such as subscriber can update the settings or arbitrary menu and put Cross-Site Scripting payloads in them which will be triggered in the related menu in the frontend |
26 Jun 2023, 18:01
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-116 |
Information
Published : 2022-03-28 18:15
Updated : 2023-11-07 03:41
NVD link : CVE-2022-0450
Mitre link : CVE-2022-0450
JSON object : View
Products Affected
freshlightlab
- menu_image\,_icons_made_easy
CWE
No CWE.
