Description
The Responsive Food and Drink Menu plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's display_pdf_menus shortcode in all versions up to, and including, 2.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-06-26
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Patch Immediately
AI Analysis

Impact

The Responsive Food and Drink Menu plugin for WordPress contains a stored cross‑site scripting weakness in its display_pdf_menus shortcode. Because the plugin fails to properly sanitize and escape user‑supplied attributes, any authenticated contributor or higher user can inject malicious JavaScript. When a page containing the shortcode is loaded, the injected scripts run in the context of the visiting user, and, based on the nature of XSS, could potentially allow account hijacking, defacement or other client‑side attacks (inferred). The nature of the flaw matches CWE‑79.

Affected Systems

The vulnerability affects all releases of the plugin through version 2.3, distributed by the vendor corporatezen222. Any WordPress site that has installed this plugin and has contributor‑level or higher users remains exposed until upgraded beyond 2.3.

Risk and Exploitability

With a CVSS score of 6.4 the flaw is considered moderate in severity, and an EPSS score of less than 1% indicates that exploitation is currently unlikely. The flaw is not listed in CISA's KEV catalog. Exploitation requires authenticated access; an attacker who can edit or add shortcodes with contributor privileges can inject scripts. Users who routinely view pages that use the shortcode are the target audience for the malicious payload, and the impact is primarily on confidentiality and integrity of client sessions.

Generated by OpenCVE AI on April 22, 2026 at 01:16 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Responsive Food and Drink Menu plugin to the latest stable release that addresses the XSS flaw.
  • Re‑evaluate contributor role permissions or revoke the ability of contributors to edit shortcodes or add custom code.
  • If an immediate upgrade is not feasible, remove the display_pdf_menus shortcode from pages or temporarily disable the plugin until a patched version is available.

Generated by OpenCVE AI on April 22, 2026 at 01:16 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-19384 The Responsive Food and Drink Menu plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's display_pdf_menus shortcode in all versions up to, and including, 2.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Mon, 07 Jul 2025 17:30:00 +0000

Type Values Removed Values Added
First Time appeared Corporatezen
Corporatezen responsive Food And Drink Menu
CPEs cpe:2.3:a:corporatezen:responsive_food_and_drink_menu:*:*:*:*:*:wordpress:*:*
Vendors & Products Corporatezen
Corporatezen responsive Food And Drink Menu

Fri, 27 Jun 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 26 Jun 2025 02:15:00 +0000

Type Values Removed Values Added
Description The Responsive Food and Drink Menu plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's display_pdf_menus shortcode in all versions up to, and including, 2.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Responsive Food and Drink Menu <= 2.3 - Authenticated (Contributor+) Stored Cross-Site Scripting via display_pdf_menus Shortcode
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Corporatezen Responsive Food And Drink Menu
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:45:41.391Z

Reserved: 2025-06-19T17:57:11.891Z

Link: CVE-2025-6378

cve-icon Vulnrichment

Updated: 2025-06-27T14:41:57.270Z

cve-icon NVD

Status : Analyzed

Published: 2025-06-26T02:15:22.887

Modified: 2025-07-07T17:15:44.053

Link: CVE-2025-6378

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T01:30:05Z

Weaknesses