Cross-Site Request Forgery in Quick Restaurant Menu Plugin for WordPress
CVE-2023-0554
7.6HIGH
What is CVE-2023-0554?
The Quick Restaurant Menu plugin for WordPress suffers from a Cross-Site Request Forgery issue, primarily due to inadequate nonce validation on its AJAX actions. This vulnerability allows unauthorized attackers to manipulate menu items, provided they can deceive a site administrator into executing an action, such as clicking a malicious link. To mitigate risks, it is crucial for users to update to the latest version of the plugin, where these security flaws are addressed.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
Quick Restaurant Menu * <= 2.0.2
References
CVSS V3.1
Score:
7.6
Severity:
HIGH
Confidentiality:
Low
Integrity:
High
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Marco Wotschka