UpMenu – Online ordering for restaurants Vulnerability (Medium) – C…

UpMenu – Online ordering for restaurants Vulnerability (Medium) – C…

by | Feb 13, 2026 | Plugins

Attack Vectors

UpMenu – Online ordering for restaurants (slug: upmenu) has a Medium-severity vulnerability (CVSS 6.4, CVE-2026-1910) that can be exploited by an authenticated WordPress user with Contributor-level access or higher.

The issue is a stored cross-site scripting (XSS) weakness in the ‘upmenu-menu’ shortcode, specifically via the ‘lang’ attribute. An attacker who can add or edit content can inject malicious script into a page where this shortcode is used. Because it is stored in the site content, the script can execute later when someone views the affected page.

This matters for business teams because “authenticated” does not always mean “trusted.” Contributor access can exist for content teams, agencies, seasonal staff, or compromised accounts—any of which can become a pathway to impact executives, finance, compliance, or customers who visit the affected pages.

Security Weakness

According to the published advisory, UpMenu versions up to and including 3.1 are vulnerable due to insufficient input sanitization and output escaping of user-supplied shortcode attributes. In practical terms, the plugin does not adequately prevent untrusted input from being stored and then rendered in a way that browsers interpret as executable script.

The vulnerability is described as requiring only low privileges (Contributor+) and low complexity, and it can be triggered without additional user interaction once the page is accessed. That combination tends to increase real-world risk, particularly on sites with multiple content authors or external partners.

At the time of the advisory, there is no known patch available. That elevates the business decision: you must choose mitigations that fit your organization’s risk tolerance, which may include removing the affected component if the exposure is unacceptable.

Technical or Business Impacts

Stored XSS can lead to outcomes that directly affect revenue, brand trust, and compliance posture. If exploited, it can enable malicious behavior in visitors’ browsers, including interference with site content, unauthorized actions performed in a logged-in user’s session, or deceptive overlays that misdirect customers.

Business-facing risks can include disrupted online ordering journeys, reduced conversion rates, damaged brand credibility, and increased customer support burden. If executives or finance staff access infected pages while logged in, the impact can expand into higher-value accounts and workflows.

Compliance and governance risks may include incident response obligations, audit findings, and third-party risk concerns—especially if the site supports regulated data flows or business-critical ordering operations. With no known patch, stakeholders should treat this as a strategic risk decision: apply compensating controls (tighten roles, restrict content publishing pathways, monitor for suspicious changes), or consider uninstalling UpMenu and replacing it with a safer alternative.

Similar Attacks

Stored XSS has been used broadly across industries to harm brand trust and compromise accounts. Public examples include:

MySpace “Samy” worm (2005) — classic self-propagating XSS incident

CVE-2018-8174 — a real-world exploited scripting flaw (NVD)

CVE-2026-1910 record — official entry for this UpMenu issue

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers