Description
The Zuppler Online Ordering plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.1.0. This is due to missing or incorrect nonce validation on the 'zuppler-online-ordering-options' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2025-07-18
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting via CSRF
Action: Apply Patch
AI Analysis

Impact

The Zuppler Online Ordering plugin for WordPress is vulnerable to Cross‑Site Request Forgery due to missing or incorrect nonce validation on the options page. An unauthenticated attacker can forge a request that an authenticated administrator might submit, which updates plugin settings and injects malicious scripts that are then stored. The result is stored cross‑site scripting that affects every visitor to the site, jeopardizing confidentiality, integrity, and availability of the web application. This flaw is a classic example of the missing or ineffective access control found in CWE‑352.

Affected Systems

The vulnerability affects the Zuppler Online Ordering WordPress plugin developed by bogdansilivestru, in all releases up to and including version 2.1.0. Users running any of these versions are potentially exposed.

Risk and Exploitability

The CVSS base score of 6.1 indicates a moderate severity level. The EPSS score is less than 1%, suggesting that exploitation is unlikely in the wild in the near term, and the vulnerability is not listed in the CISA KEV catalog. Attackers would need to provoke an administrator to click a crafted link while the victim is logged in with administrative privileges. Once the forged request succeeds, an attacker can inject arbitrary script that will run in the context of any user accessing the site, making this risk primarily a cross‑site scripting threat rather than a direct remote code execution scenario.

Generated by OpenCVE AI on April 20, 2026 at 22:14 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest release of Zuppler Online Ordering or remove the plugin altogether
  • Implement nonce verification for every admin‑only write operation in the plugin; if the code is modifiable, re‑introduce the missing check on the options endpoint
  • Limit access to the options page by tightening role capabilities, ensuring that only users with the necessary permissions can reach the vulnerable function so any forged request would fail

Generated by OpenCVE AI on April 20, 2026 at 22:14 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-21838 The Zuppler Online Ordering plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.1.0. This is due to missing or incorrect nonce validation on the 'zuppler-online-ordering-options' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
History

Fri, 18 Jul 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 18 Jul 2025 04:30:00 +0000

Type Values Removed Values Added
Description The Zuppler Online Ordering plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.1.0. This is due to missing or incorrect nonce validation on the 'zuppler-online-ordering-options' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title Zuppler Online Ordering <= 2.1.0 - Cross-Site Request Forgery to Stored Cross-Site Scripting
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:27:23.433Z

Reserved: 2025-06-13T12:33:48.149Z

Link: CVE-2025-6053

cve-icon Vulnrichment

Updated: 2025-07-18T14:54:37.662Z

cve-icon NVD

Status : Deferred

Published: 2025-07-18T05:15:31.750

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-6053

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T22:15:06Z

Weaknesses