Vulnerability Description
The Menu Image, Icons made easy WordPress plugin before 3.0.6 does not have authorisation and CSRF checks when saving menu settings, and does not validate, sanitise and escape them. As a result, any authenticate users, such as subscriber can update the settings or arbitrary menu and put Cross-Site Scripting payloads in them which will be triggered in the related menu in the frontend
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Freshlightlab | Menu Image\, Icons Made Easy | < 3.0.8 |
Related Weaknesses (CWE)
References
- https://wpscan.com/vulnerability/612f9273-acc8-4be6-b372-33f1e687f54aExploitThird Party Advisory
- https://wpscan.com/vulnerability/612f9273-acc8-4be6-b372-33f1e687f54aExploitThird Party Advisory
FAQ
What is CVE-2022-0450?
CVE-2022-0450 is a vulnerability with a CVSS score of 5.4 (MEDIUM). The Menu Image, Icons made easy WordPress plugin before 3.0.6 does not have authorisation and CSRF checks when saving menu settings, and does not validate, sanitise and escape them. As a result, any a...
How severe is CVE-2022-0450?
CVE-2022-0450 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-0450?
Check the references section above for vendor advisories and patch information. Affected products include: Freshlightlab Menu Image\, Icons Made Easy.