### [CVE-2024-13010](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-13010) ![](https://img.shields.io/static/v1?label=Product&message=WP%20Foodbakery&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=*%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Improper%20Neutralization%20of%20Input%20During%20Web%20Page%20Generation%20('Cross-site%20Scripting')&color=brightgreen) ### Description The WP Foodbakery plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 4.7 due to insufficient input sanitization and output escaping on the 'search_type' parameter. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. ### POC #### Reference - https://themeforest.net/item/food-bakery-restaurant-bakery-responsive-wordpress-theme/18970331 #### Github - https://github.com/cyb3r-w0lf/nuclei-template-collection