Description
The Side Slide Responsive Menu plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0. This is due to missing or incorrect nonce validation on a function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2025-09-12
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting triggered by Cross‑Site Request Forgery
Action: Update Plugin
AI Analysis

Impact

The Side Slide Responsive Menu plugin is affected by a missing or incorrect nonce check, which allows an unauthenticated attacker to send a forged request that updates the plugin’s settings. By doing so, the attacker can inject arbitrary JavaScript that is stored in the database and executed in the context of the site, resulting in a stored Cross‑Site Scripting (XSS) vulnerability. The weakness is a classic Cross‑Site Request Forgery flaw (CWE‑352).

Affected Systems

All WordPress sites that have installed the Side Slide Responsive Menu plugin version 1.0 or earlier, provided by the vendor dejocar. The vulnerability applies to each installation of the plugin in those versions regardless of WordPress core or theme.

Risk and Exploitability

The CVSS score of 6.1 indicates a moderate severity, and the EPSS score of less than 1% suggests that the vulnerability is unlikely to be widely exploited at this time. It is not listed in the CISA KEV catalog. Exploitation would require the attacker to lure an administrative user into clicking a crafted link or otherwise submitting a forged request that bypasses nonce validation. If the target site lacks monitoring for unauthorized script changes, an attacker could achieve persistent client‑side code execution with potential for data theft or automated defacement. The risk is moderate but real, particularly for high‑traffic or highly valuable sites.

Generated by OpenCVE AI on April 21, 2026 at 02:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Side Slide Responsive Menu plugin to the latest available version that includes proper nonce validation or remove the plugin if no update exists.
  • After upgrading or uninstalling, perform a full scan of the site’s database and content for injected scripts and purge any malicious entries.
  • If an immediate upgrade is not possible, add an additional nonce check on all plugin settings endpoints to prevent unauthenticated POST or GET requests from modifying configuration before the update is available.

Generated by OpenCVE AI on April 21, 2026 at 02:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-29011 The Side Slide Responsive Menu plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0. This is due to missing or incorrect nonce validation on a function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
History

Fri, 12 Sep 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 12 Sep 2025 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Dejocar
Dejocar side Slide Responsive Menu
Wordpress
Wordpress wordpress
Vendors & Products Dejocar
Dejocar side Slide Responsive Menu
Wordpress
Wordpress wordpress

Fri, 12 Sep 2025 03:45:00 +0000

Type Values Removed Values Added
Description The Side Slide Responsive Menu plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.0. This is due to missing or incorrect nonce validation on a function. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title Side Slide Responsive Menu <= 1.0 - Cross-Site Request Forgery to Stored Cross-Site Scripting
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Dejocar Side Slide Responsive Menu
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:54:31.230Z

Reserved: 2025-09-02T21:43:58.690Z

Link: CVE-2025-9880

cve-icon Vulnrichment

Updated: 2025-09-12T17:12:31.738Z

cve-icon NVD

Status : Deferred

Published: 2025-09-12T04:16:06.177

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-9880

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T03:00:06Z

Weaknesses