Description
Cross-Site Request Forgery (CSRF) vulnerability in Jordi Salord WP-Easy Menu wp-easy-menu allows Stored XSS.This issue affects WP-Easy Menu: from n/a through <= 0.41.
Published: 2025-04-09
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Cross‑Site Request Forgery allows an attacker to inject malicious JavaScript that is stored in the WordPress database via the WP‑Easy Menu plugin. Once stored, the script runs in the browser context of any user who views the affected page, allowing attackers to hijack sessions, deface the site, or perform further phishing attacks. This stored XSS is the primary impact described in the CVE.

Affected Systems

Jordi Salord’s WP‑Easy Menu plugin for WordPress is affected for all releases from the earliest available version up to and including 0.41. Any site running the plugin on or before version 0.41 is vulnerable.

Risk and Exploitability

The CVSS score of 7.1 indicates a high potential impact, while the EPSS score of <1 % suggests exploitation is unlikely but not impossible. The vulnerability can be triggered by crafting a forged request that an authenticated user submits via the plugin’s interface, after which the malicious content is stored and later rendered. The vulnerability is not listed in CISA’s KEV catalog, meaning no widespread exploitation has been reported. Administrators should assume the risk could be exploited in environments where the plugin is enabled and users have sufficient privileges.

Generated by OpenCVE AI on April 30, 2026 at 23:45 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update WP‑Easy Menu to the latest version, which removes the CSRF to stored XSS flaw.
  • If an upgrade is not immediately possible, temporarily disable or uninstall the plugin until a patch can be applied.
  • Restrict the plugin’s menu‑editing capabilities to administrators only and enable site‑wide CSRF protection to mitigate the vector.

Generated by OpenCVE AI on April 30, 2026 at 23:45 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-10616 Cross-Site Request Forgery (CSRF) vulnerability in Jordi Salord WP-Easy Menu allows Stored XSS. This issue affects WP-Easy Menu: from n/a through 0.41.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Jordi Salord WP-Easy Menu allows Stored XSS. This issue affects WP-Easy Menu: from n/a through 0.41. Cross-Site Request Forgery (CSRF) vulnerability in Jordi Salord WP-Easy Menu wp-easy-menu allows Stored XSS.This issue affects WP-Easy Menu: from n/a through <= 0.41.
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Wed, 09 Apr 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 09 Apr 2025 16:30:00 +0000

Type Values Removed Values Added
Description Cross-Site Request Forgery (CSRF) vulnerability in Jordi Salord WP-Easy Menu allows Stored XSS. This issue affects WP-Easy Menu: from n/a through 0.41.
Title WordPress WP-Easy Menu plugin <= 0.41 - CSRF to Stored XSS vulnerability
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:21.852Z

Reserved: 2025-04-09T11:18:53.986Z

Link: CVE-2025-32477

cve-icon Vulnrichment

Updated: 2025-04-09T17:40:35.952Z

cve-icon NVD

Status : Deferred

Published: 2025-04-09T17:15:39.813

Modified: 2026-04-23T15:28:57.197

Link: CVE-2025-32477

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T00:00:05Z

Weaknesses