The food-and-drink-menu plugin through 2.2.0 for WordPress allows remote attackers to execute arbitrary code because of an unserialize operation on the fdm_cart cookie in load_cart_from_cookie in includes/class-cart-manager.php.
The product deserializes untrusted data without sufficiently ensuring that the resulting data will be valid.
Link | Tags |
---|---|
https://wordpress.org/plugins/food-and-drink-menu/#developers | third party advisory release notes |
https://appcheck-ng.com/cve-2020-29045/ | third party advisory exploit |