CVE-2025-26543

7.1 HIGH

📋 TL;DR

A Cross-Site Request Forgery (CSRF) vulnerability in the Simple Responsive Menu WordPress plugin allows attackers to perform stored cross-site scripting (XSS) attacks. This affects WordPress sites using Simple Responsive Menu versions up to 2.1. Attackers can inject malicious scripts that execute when users visit compromised pages.

💻 Affected Systems

Products:
  • Simple Responsive Menu WordPress Plugin
Versions: n/a through 2.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations using vulnerable versions of the plugin, regardless of WordPress version or configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could inject malicious JavaScript that steals admin credentials, redirects users to phishing sites, or takes over administrative accounts, potentially leading to complete site compromise.

🟠

Likely Case

Attackers inject malicious scripts that display unwanted content, redirect users to malicious sites, or steal session cookies from logged-in users.

🟢

If Mitigated

With proper CSRF protections and content security policies, the attack surface is reduced, though the vulnerability still exists in the codebase.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires tricking an authenticated user (typically an administrator) into performing a malicious action, but no authentication is needed for the CSRF attack itself once the user is tricked.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 2.2 or later

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/simple-responsive-menu/vulnerability/wordpress-simple-responsive-menu-plugin-2-1-csrf-to-stored-xss-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find Simple Responsive Menu and click 'Update Now' if available. 4. If no update is available, deactivate and delete the plugin, then install version 2.2+ from the WordPress repository.

🔧 Temporary Workarounds

Disable Plugin

WordPress

Temporarily disable the Simple Responsive Menu plugin to eliminate the vulnerability.

wp plugin deactivate simple-responsive-menu

Implement CSRF Tokens

WordPress

Add CSRF protection to WordPress forms if you have development capabilities.

🧯 If You Can't Patch

  • Remove the Simple Responsive Menu plugin completely and use an alternative menu solution.
  • Implement strict Content Security Policy (CSP) headers to mitigate XSS impact.

🔍 How to Verify

Check if Vulnerable:

Check the plugin version in WordPress admin under Plugins > Installed Plugins. If Simple Responsive Menu is version 2.1 or earlier, you are vulnerable.

Check Version:

wp plugin get simple-responsive-menu --field=version

Verify Fix Applied:

After updating, verify the plugin version shows 2.2 or later in the WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to WordPress admin-ajax.php or admin-post.php involving the simple-responsive-menu plugin
  • Unexpected modifications to menu settings in database logs

Network Indicators:

  • HTTP requests with suspicious JavaScript payloads in parameters related to menu configuration

SIEM Query:

source="wordpress.log" AND ("simple-responsive-menu" OR "sr-menu") AND ("POST" OR "admin-ajax") AND ("script" OR "javascript" OR "onerror")

🔗 References

📤 Share & Export