// For flags

CVE-2023-0555

Quick Restaurant Menu <= 2.0.2 - Missing Authorization

Severity Score

5.4
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

The Quick Restaurant Menu plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on its AJAX actions in versions up to, and including, 2.0.2. This makes it possible for authenticated attackers, with subscriber-level permissions and above, to invoke those actions intended for administrator use. Actions include menu item creation, update and deletion and other menu management functions. Since the plugin does not verify that a post ID passed to one of its AJAX actions belongs to a menu item, this can lead to arbitrary post deletion/alteration.

El complemento Quick Restaurant Menu para WordPress es vulnerable a la omisión de autorización debido a una falta de verificación de capacidad en sus acciones AJAX en versiones hasta la 2.0.2 incluida. Esto hace posible que los atacantes autenticados, con permisos de nivel de suscriptor y superiores, invoquen aquellas acciones destinadas al uso del administrador. Las acciones incluyen la creación, actualización y eliminación de elementos del menú y otras funciones de gestión del menú. Dado que el complemento no verifica que una ID de publicación pasada a una de sus acciones AJAX pertenezca a un elemento del menú, esto puede llevar a la eliminación/alteración arbitraria de una publicación.

*Credits: Marco Wotschka, Ivan Kuzymchak
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
High
Availability
Low
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2023-01-27 CVE Reserved
  • 2023-01-27 CVE Published
  • 2024-08-19 EPSS Updated
  • 2025-01-13 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-862: Missing Authorization
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Thingsforrestaurants
Search vendor "Thingsforrestaurants"
Quick Restaurant Menu
Search vendor "Thingsforrestaurants" for product "Quick Restaurant Menu"
< 2.1.0
Search vendor "Thingsforrestaurants" for product "Quick Restaurant Menu" and version " < 2.1.0"
wordpress
Affected