Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in OpenMenu OpenMenu allows Stored XSS. This issue affects OpenMenu: from n/a through 3.5.
Published: 2025-03-31
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The OpenMenu plugin for WordPress suffers from an improper neutralization of input during web page generation that allows a stored cross‑site scripting vulnerability. Malicious users can embed attacker‑controlled scripts in data that the plugin stores and later renders on the site, enabling the injection of code that runs in the context of any visitor who views the affected menu. This flaw is classified as CWE‑79 and can compromise confidential information, undermine data integrity, or facilitate defacement of the site if an attacker’s script is executed.

Affected Systems

All releases of the OpenMenu WordPress plugin up to version 3.5 inclusive are affected. Site administrators using any of the 3.5 or earlier releases are vulnerable.

Risk and Exploitability

The CVSS score of 6.5 indicates a moderate severity risk. The EPSS value of less than 1 % suggests a low exploitation probability at present, and the vulnerability is not yet listed in CISA’s KEV catalog, however the attack vector is most likely through accessible input fields provided by the plugin that are stored and later included in the generated page. If an attacker can submit data—typically via a menu creation or editing interface—the malicious content will persist and be delivered to all users that view the menu. No public exploit is currently documented, but the combination of stored payloads and ubiquitous user interaction makes the scenario plausible.

Generated by OpenCVE AI on May 1, 2026 at 02:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the OpenMenu plugin to the latest version that includes the XSS fix.
  • If an update cannot be performed immediately, disable or remove the plugin until the remediation is applied.
  • Implement a strict Content Security Policy that blocks inline scripts and limits script sources to trusted domains, mitigating the impact of any remaining stored payloads.
  • Ensure that any data rendered by the plugin is properly escaped; apply server‑side input validation and output escaping to cover legacy code paths.

Generated by OpenCVE AI on May 1, 2026 at 02:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-8757 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in OpenMenu OpenMenu allows Stored XSS. This issue affects OpenMenu: from n/a through 3.5.
History

Tue, 28 Apr 2026 19:45:00 +0000


Tue, 28 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in OpenMenu OpenMenu open-menu allows Stored XSS.This issue affects OpenMenu: from n/a through <= 3.5. Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in OpenMenu OpenMenu allows Stored XSS. This issue affects OpenMenu: from n/a through 3.5.
References

Thu, 23 Apr 2026 15:30:00 +0000


Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in OpenMenu OpenMenu allows Stored XSS. This issue affects OpenMenu: from n/a through 3.5. Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in OpenMenu OpenMenu open-menu allows Stored XSS.This issue affects OpenMenu: from n/a through <= 3.5.
References

Mon, 31 Mar 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 31 Mar 2025 13:00:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in OpenMenu OpenMenu allows Stored XSS. This issue affects OpenMenu: from n/a through 3.5.
Title WordPress OpenMenu plugin <= 3.5 - Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:09.680Z

Reserved: 2025-03-31T10:05:57.598Z

Link: CVE-2025-31593

cve-icon Vulnrichment

Updated: 2025-03-31T15:00:38.525Z

cve-icon NVD

Status : Deferred

Published: 2025-03-31T13:15:52.937

Modified: 2026-04-28T19:31:10.050

Link: CVE-2025-31593

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T03:00:08Z

Weaknesses