Description
Cross-Site Request Forgery (CSRF) vulnerability in Wow-Company Float menu float-menu allows Cross Site Request Forgery.This issue affects Float menu: from n/a through <= 6.1.2.
Published: 2025-03-27
Score: 5.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Float menu WordPress plugin contains a CSRF weakness that allows an attacker to alter the plugin’s configuration without proper authorization. This flaw exploits the fact that settings changes can be made through authenticated requests that lack sufficient non‑ce protection, enabling a malicious site to submit forged requests via a victim’s browser. The vulnerability directly affects the confidentiality of the site’s configuration and could be leveraged to enable further compromises. The associated weakness is classified as CWE‑352.

Affected Systems

Any WordPress installation running Wow‑Company’s Float menu plugin version 6.1.2 or earlier is vulnerable. The affected product is the Float menu plugin shipped for WordPress sites; the exact version range is all releases up to and including 6.1.2.

Risk and Exploitability

With a CVSS score of 5.4 the flaw is of moderate severity. The EPSS score of less than 1 % indicates a very low probability of exploitation in the wild, and the vulnerability is not catalogued in CISA’s KEV list. Based on the description, the attack path requires a victim to be authenticated to the administrative interface and to have a browser session active, after which a crafted request can alter plugin settings by exploiting the missing CSRF token check. Although the likelihood of exploitation remains small, the impact of an unauthorized settings change can enable broader attack surface expansion or bypass of security controls, so the interaction between a moderate severity score and the exploit probability should not be ignored.

Generated by OpenCVE AI on May 1, 2026 at 12:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Float menu to a version newer than 6.1.2.
  • If an upgrade cannot be performed immediately, restrict administrative access to trusted users only and ensure that all configuration changes require a valid WordPress nonce or CSRF token.
  • Disable or remove the Float menu plugin if it is not required for site functionality.

Generated by OpenCVE AI on May 1, 2026 at 12:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-8301 Cross-Site Request Forgery (CSRF) vulnerability in Wow-Company Float menu allows Cross Site Request Forgery. This issue affects Float menu: from n/a through 6.1.2.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Wow-Company Float menu allows Cross Site Request Forgery. This issue affects Float menu: from n/a through 6.1.2. Cross-Site Request Forgery (CSRF) vulnerability in Wow-Company Float menu float-menu allows Cross Site Request Forgery.This issue affects Float menu: from n/a through <= 6.1.2.
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L'}


Thu, 27 Mar 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 27 Mar 2025 11:00:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Wow-Company Float menu allows Cross Site Request Forgery. This issue affects Float menu: from n/a through 6.1.2.
Title WordPress Float menu plugin <= 6.1.2 - Cross Site Request Forgery (CSRF) to Settings Change vulnerability
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:00.367Z

Reserved: 2025-03-26T09:21:38.618Z

Link: CVE-2025-30912

cve-icon Vulnrichment

Updated: 2025-03-27T14:25:57.320Z

cve-icon NVD

Status : Deferred

Published: 2025-03-27T11:15:51.953

Modified: 2026-04-23T15:27:18.823

Link: CVE-2025-30912

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T13:00:12Z

Weaknesses