5.4

CVE-2022-0450

Exploit

Menu Image, Icons made easy <= 3.0.7 - Authenticated Cross-Site Scripting

The Menu Image, Icons made easy WordPress plugin before 3.0.6 does not have authorisation and CSRF checks when saving menu settings, and does not validate, sanitise and escape them. As a result, any authenticate users, such as subscriber can update the settings or arbitrary menu and put Cross-Site Scripting payloads in them which will be triggered in the related menu in the frontend
Mögliche Gegenmaßnahme
Menu Image, Icons made easy: Update to version 3.0.8, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
Produkt Menu Image, Icons made easy
Version [*, 3.0.8)
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
FreshlightlabMenu Image, Icons Made Easy SwPlatformwordpress Version < 3.0.8
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.25% 0.478
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 5.4 2.3 2.7
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
nvd@nist.gov 3.5 6.8 2.9
AV:N/AC:M/Au:S/C:N/I:P/A:N
CWE-116 Improper Encoding or Escaping of Output

The product prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved.