5.4
CVE-2022-0450
- EPSS 0.25%
- Veröffentlicht 28.03.2022 18:15:08
- Zuletzt bearbeitet 21.11.2024 06:38:38
- Quelle contact@wpscan.com
- CVE-Watchlists
- Unerledigt
Menu Image, Icons made easy <= 3.0.7 - Authenticated Cross-Site Scripting
The Menu Image, Icons made easy WordPress plugin before 3.0.6 does not have authorisation and CSRF checks when saving menu settings, and does not validate, sanitise and escape them. As a result, any authenticate users, such as subscriber can update the settings or arbitrary menu and put Cross-Site Scripting payloads in them which will be triggered in the related menu in the frontend
Mögliche Gegenmaßnahme
Menu Image, Icons made easy: Update to version 3.0.8, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Menu Image, Icons made easy
Version
[*, 3.0.8)
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Freshlightlab ≫ Menu Image, Icons Made Easy SwPlatformwordpress Version < 3.0.8
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.25% | 0.478 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 5.4 | 2.3 | 2.7 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
|
| nvd@nist.gov | 3.5 | 6.8 | 2.9 |
AV:N/AC:M/Au:S/C:N/I:P/A:N
|
CWE-116 Improper Encoding or Escaping of Output
The product prepares a structured message for communication with another component, but encoding or escaping of the data is either missing or done incorrectly. As a result, the intended structure of the message is not preserved.