CVE-2025-58812: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in PriceListo Best Restaurant Menu by PriceListo
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PriceListo Best Restaurant Menu by PriceListo allows Stored XSS. This issue affects Best Restaurant Menu by PriceListo: from n/a through 1.4.3.
AI Analysis
Technical Summary
CVE-2025-58812 is a Stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, affecting the 'Best Restaurant Menu by PriceListo' plugin up to version 1.4.3. This vulnerability arises from improper neutralization of user-supplied input during web page generation, allowing malicious scripts to be injected and stored within the application. When other users or administrators access the affected pages, the malicious payload executes in their browsers, potentially leading to session hijacking, credential theft, or unauthorized actions performed with the victim's privileges. The vulnerability has a CVSS 3.1 base score of 6.5, indicating a medium severity level. The vector metrics specify that the attack can be launched remotely over the network (AV:N) with low attack complexity (AC:L), requiring privileges (PR:L) and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the vulnerable component. The impact includes low confidentiality, integrity, and availability impacts (C:L/I:L/A:L), reflecting limited but non-negligible consequences. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability primarily targets web applications using the PriceListo plugin, which is commonly used by restaurants to display menus online.
Potential Impact
For European organizations, particularly those in the hospitality and restaurant sectors using the PriceListo Best Restaurant Menu plugin, this vulnerability poses a risk of client-side attacks that can compromise customer data and trust. Exploitation could lead to theft of session cookies, enabling attackers to impersonate users or administrators, potentially resulting in unauthorized changes to menu content or access to backend systems. This could damage brand reputation and lead to regulatory scrutiny under GDPR if personal data is compromised. The medium severity suggests that while the vulnerability is not critical, it still represents a significant risk, especially if combined with other vulnerabilities or social engineering tactics. Given the widespread use of web-based menu systems in Europe, the threat could affect many small to medium-sized enterprises that may lack robust cybersecurity defenses.
Mitigation Recommendations
Organizations should immediately audit their use of the PriceListo Best Restaurant Menu plugin and verify the version in use. Until an official patch is released, practical mitigations include implementing Web Application Firewall (WAF) rules to detect and block typical XSS payloads targeting the plugin's input fields. Input validation and output encoding should be enforced at the application level to sanitize user inputs rigorously. Administrators should restrict privileges to the minimum necessary and educate users about the risks of interacting with suspicious links or content. Additionally, Content Security Policy (CSP) headers can be deployed to limit the execution of unauthorized scripts. Regular monitoring of logs for unusual activity and prompt application of vendor updates once available are critical. Organizations should also consider isolating the plugin or replacing it with alternatives that have a stronger security posture.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-58812: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in PriceListo Best Restaurant Menu by PriceListo
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in PriceListo Best Restaurant Menu by PriceListo allows Stored XSS. This issue affects Best Restaurant Menu by PriceListo: from n/a through 1.4.3.
AI-Powered Analysis
Technical Analysis
CVE-2025-58812 is a Stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, affecting the 'Best Restaurant Menu by PriceListo' plugin up to version 1.4.3. This vulnerability arises from improper neutralization of user-supplied input during web page generation, allowing malicious scripts to be injected and stored within the application. When other users or administrators access the affected pages, the malicious payload executes in their browsers, potentially leading to session hijacking, credential theft, or unauthorized actions performed with the victim's privileges. The vulnerability has a CVSS 3.1 base score of 6.5, indicating a medium severity level. The vector metrics specify that the attack can be launched remotely over the network (AV:N) with low attack complexity (AC:L), requiring privileges (PR:L) and user interaction (UI:R). The scope is changed (S:C), meaning the vulnerability affects resources beyond the vulnerable component. The impact includes low confidentiality, integrity, and availability impacts (C:L/I:L/A:L), reflecting limited but non-negligible consequences. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability primarily targets web applications using the PriceListo plugin, which is commonly used by restaurants to display menus online.
Potential Impact
For European organizations, particularly those in the hospitality and restaurant sectors using the PriceListo Best Restaurant Menu plugin, this vulnerability poses a risk of client-side attacks that can compromise customer data and trust. Exploitation could lead to theft of session cookies, enabling attackers to impersonate users or administrators, potentially resulting in unauthorized changes to menu content or access to backend systems. This could damage brand reputation and lead to regulatory scrutiny under GDPR if personal data is compromised. The medium severity suggests that while the vulnerability is not critical, it still represents a significant risk, especially if combined with other vulnerabilities or social engineering tactics. Given the widespread use of web-based menu systems in Europe, the threat could affect many small to medium-sized enterprises that may lack robust cybersecurity defenses.
Mitigation Recommendations
Organizations should immediately audit their use of the PriceListo Best Restaurant Menu plugin and verify the version in use. Until an official patch is released, practical mitigations include implementing Web Application Firewall (WAF) rules to detect and block typical XSS payloads targeting the plugin's input fields. Input validation and output encoding should be enforced at the application level to sanitize user inputs rigorously. Administrators should restrict privileges to the minimum necessary and educate users about the risks of interacting with suspicious links or content. Additionally, Content Security Policy (CSP) headers can be deployed to limit the execution of unauthorized scripts. Regular monitoring of logs for unusual activity and prompt application of vendor updates once available are critical. Organizations should also consider isolating the plugin or replacing it with alternatives that have a stronger security posture.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-09-05T10:49:12.188Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68baeaa257c5b37b67a4602a
Added to database: 9/5/2025, 1:50:26 PM
Last enriched: 9/5/2025, 2:17:51 PM
Last updated: 9/5/2025, 8:04:45 PM
Views: 2
Related Threats
CVE-2025-10060: CWE-672 Operation on a Resource after Expiration or Release in MongoDB Inc MongoDB Server
MediumCVE-2025-10061: CWE-20 Improper Input Validation in MongoDB Inc MongoDB Server
MediumCVE-2025-53791: CWE-284: Improper Access Control in Microsoft Microsoft Edge (Chromium-based)
MediumCVE-2025-10059: CWE-732 Incorrect Permission Assignment for Critical Resource in MongoDB Inc MongoDB Server
MediumCVE-2025-10043: External Control of File Name or Path in Red Hat Red Hat Build of Keycloak
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.