cleantalk
Vulnerabilities and Security Researches

Vulnerabilities and security researches forquadmenu quadmenu

Direction: ascending
Jun 07, 2024

WordPress Mega Menu – QuadMenu # fb06d5d6f0e1d283dcf005ac94f52eaa0d2b6fdb

Date
Feb 22, 2021
Research Description
WordPress Mega Menu &#8211; QuadMenu [quadmenu] < 2.0.7 WordPress QuadMenu plugin <= 2.0.6 - Remote Code Execution (RCE) vulnerability Remote Code Execution (RCE) vulnerability found by Mikel Gorraiz in WordPress QuadMenu plugin (versions <= 2.0.6).
Affected versions
Min -, max -.
Status
vulnerable
Oct 18, 2024

WordPress Mega Menu &#8211; QuadMenu # CVE-2021-4443

CVE, Research URL

CVE-2021-4443

Date
Oct 16, 2024
Research Description
The WordPress Mega Menu plugin for WordPress is vulnerable to Arbitrary File Creation in versions up to, and including, 2.0.6 via the compiler_save AJAX action. This makes it possible for unauthenticated attackers to create arbitrary PHP files that can be used to execute malicious code.
Affected versions
Min -, max -.
Status
vulnerable
Apr 14, 2025

WordPress Mega Menu &#8211; QuadMenu # CVE-2025-2871

CVE, Research URL

CVE-2025-2871

Date
Apr 12, 2025
Research Description
The WordPress Mega Menu – QuadMenu plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.2.0. This is due to missing or incorrect nonce validation on the ajax_dismiss_notice() function. This makes it possible for unauthenticated attackers to update any user meta to a value of one, including wp_capabilities which could result in a privilege deescalation of an administrator, via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Affected versions
Min -, max -.
Status
vulnerable