MEDIUM (5.0)
    Core

    Reflected Cross-Site Scripting (XSS) in VikRestaurants Plugin

    Published Date: 3/25/2026
    CVE ID: CVE-2026-25025

    Summary

    A reflected Cross-Site Scripting (XSS) vulnerability exists in the VikRestaurants plugin for WordPress, affecting versions up to and including 1.5.2. This vulnerability allows attackers to inject malicious scripts into web pages viewed by other users.

    Vulnerability Details

    The VikRestaurants plugin for WordPress is susceptible to a Cross-Site Scripting (XSS) vulnerability due to improper neutralization of input during web page generation. This reflects an absence of adequate input sanitization or output encoding, allowing attackers to manipulate HTTP requests, inject malicious scripts, and have them executed in the context of the victim's browser. Such a flaw can be leveraged for various purposes, including session hijacking or redirecting users to malicious sites. This vulnerability can greatly compromise the integrity of the website and the privacy of its users. Therefore, immediate action is necessary to address this issue. Although the CVSS score is currently unknown, the potential for harm justifies prioritizing this vulnerability.

    Recommendations

    Site administrators should implement input validation and output encoding to prevent injection of untrusted data. Regularly review and sanitize user inputs, especially those that are dynamically included in web pages. Enable Content Security Policy (CSP) to minimize the impact of XSS and advise users to maintain up-to-date web browsers and security solutions.

    Available Fixes

    Last Updated: 3/28/2026
    Jedar

    Jedar for Digital Rights is a non-profit organization dedicated to protecting digital freedoms, enhancing online privacy, and promoting secure digital practices for vulnerable communities worldwide.

    Follow Us

    All Rights Reserved © 2026 Jedar for Digital Rights.

    Cookie Preferences

    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.

    Learn More