Stored Cross-Site Scripting in Quick Restaurant Menu Plugin for WordPress
CVE-2023-0553
4.8MEDIUM
Summary
The Quick Restaurant Menu plugin for WordPress allows authenticated attackers with administrator-level permissions to exploit a stored cross-site scripting vulnerability. The lack of proper input sanitization and output escaping in the plugin's settings parameters enables attackers to inject arbitrary web scripts. These scripts execute when a user accesses the compromised pages, potentially leading to unauthorized actions or data exposure.
Affected Version(s)
Quick Restaurant Menu * <= 2.0.2
References
CVSS V3.1
Score:
4.8
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Marco Wotschka
Ivan Kuzymchak