The Restaurant Menu – Food Ordering System – Table Reservation plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'action' parameter in all versions up to, and including, 2.4.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Metrics
Affected Vendors & Products
References
History
Tue, 26 Nov 2024 21:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Oracle
Oracle restaurant Menu - Food Ordering System - Table Reservation |
|
CPEs | cpe:2.3:a:oracle:restaurant_menu_-_food_ordering_system_-_table_reservation:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Oracle
Oracle restaurant Menu - Food Ordering System - Table Reservation |
Wed, 20 Nov 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 20 Nov 2024 05:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Restaurant Menu – Food Ordering System – Table Reservation plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'action' parameter in all versions up to, and including, 2.4.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. | |
Title | Restaurant Menu – Food Ordering System – Table Reservation <= 2.4.2 - Reflected Cross-Site Scripting | |
Weaknesses | CWE-79 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-11-20T19:17:07.366Z
Reserved: 2024-10-08T19:22:11.444Z
Link: CVE-2024-9653

Updated: 2024-11-20T19:17:03.866Z

Status : Analyzed
Published: 2024-11-20T06:15:16.603
Modified: 2024-11-26T20:37:07.913
Link: CVE-2024-9653

No data.