The Menu Image, Icons made easy WordPress plugin before 3.0.6 does not have authorisation and CSRF checks when saving menu settings, and does not validate, sanitise and escape them. As a result, any authenticate users, such as subscriber can update the settings or arbitrary menu and put Cross-Site Scripting payloads in them which will be triggered in the related menu in the frontend
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published:

Updated: 2024-08-02T23:25:40.610Z

Reserved: 2022-02-01T00:00:00

Link: CVE-2022-0450

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-03-28T18:15:08.850

Modified: 2024-11-21T06:38:38.970

Link: CVE-2022-0450

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.