Description
The Custom Admin-Bar Favorites plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'menuObject' parameter in all versions up to, and including, 0.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Published: 2025-04-25
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Reflected Cross‑Site Scripting
Action: Apply Patch
AI Analysis

Impact

The Custom Admin‑Bar Favorites WordPress plugin, versions up to and including 0.1, accepts a user‑supplied parameter called menuObject that is neither properly sanitized nor escaped. This allows an attacker to inject arbitrary client‑side scripts when the parameter value is reflected in the page response. An unauthenticated attacker can therefore exploit the vulnerability simply by luring a victim to a crafted URL, leading to the execution of malicious JavaScript in the victim’s browser. The impact includes theft of session cookies, credential phishing, or other malicious actions performed on behalf of the user. The weakness is a classic reflected Cross‑Site Scripting flaw identified as CWE‑79.

Affected Systems

Any WordPress site that has installed the Custom Admin‑Bar Favorites plugin with a version 0.1 or earlier is affected. The vulnerability exists in the plugin’s menu handling code and is triggered by the menuObject query string parameter present in the browser request. The plugin is distributed under the codeandreload vendor and can be found in the WordPress plugin repository or other third‑party listings.

Risk and Exploitability

The CVSS score of 6.1 indicates moderate severity. The EPSS rating of less than 1% suggests that exploitation is currently considered unlikely. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is a web‑based malicious link that a user may click; exploiting it requires no authentication or privilege escalation, making the attack relatively accessible to casual threat actors.

Generated by OpenCVE AI on April 22, 2026 at 01:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Custom Admin‑Bar Favorites plugin to the latest version (beyond 0.1) or uninstall it if a patch is not available.
  • If the plugin must remain active and no newer version exists, disable the menuObject parameter entirely or remove the affected code path, and enforce strict input validation and output escaping using WordPress’s sanitization functions or a dedicated security plugin.
  • Deploy a Content Security Policy that blocks inline scripts and whitelists only trusted script sources, reducing the damage of any reflected payload.
  • Monitor logs for attempts to exploit the menuObject parameter and block suspicious traffic through web‑application firewall rules or rate‑limiting.

Generated by OpenCVE AI on April 22, 2026 at 01:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-12390 The Custom Admin-Bar Favorites plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'menuObject' parameter in all versions up to, and including, 0.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
History

Fri, 25 Apr 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 25 Apr 2025 07:00:00 +0000

Type Values Removed Values Added
Description The Custom Admin-Bar Favorites plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'menuObject' parameter in all versions up to, and including, 0.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Title Custom Admin-Bar Favorites <= 0.1 - Reflected Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:48:42.156Z

Reserved: 2025-04-22T14:49:46.619Z

Link: CVE-2025-3868

cve-icon Vulnrichment

Updated: 2025-04-25T15:43:26.264Z

cve-icon NVD

Status : Deferred

Published: 2025-04-25T07:15:48.473

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-3868

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T01:45:05Z

Weaknesses