From this webpage screenshot, the following key information about the vulnerability can be obtained: 1. Vulnerability Name: Easy Mega Menu Plugin for WordPress - ThemeHunk <= 1.1.0 - Authenticated (Subscriber+) Stored Cross-Site Scripting 2. Vulnerability Type: Cross-site Scripting (XSS) 3. Affected Scope: Easy Mega Menu plugin for ThemeHunk <= version 1.1.0 4. Vulnerability Description: - Describes an issue where the parameter in all versions (including 1.1.0) does not properly sanitize input. - This vulnerability allows users with Subscriber or higher privileges to inject arbitrary scripts into pages, which will execute when other users access the affected pages. 5. Vulnerability Rating: - CVSS Score: 3.1 - CVSS Score: 6.4 (Medium) 6. Public Release Date: October 7, 2024 7. Last Updated Date: October 8, 2024 8. Researcher: Lucio Sá 9. Fix Status: Fixed. Users are advised to update to version 1.1.1 or higher. 10. Reference Links: - plugins.trac.wordpress.org - plugins.trac.wordpress.org - plugins.trac.wordpress.org 11. Sharing Options: - Facebook - Twitter - LinkedIn - Email 12. Copyright and Licensing Information: - Copyright and licensing information for Defiant Inc. - Copyright and licensing information for MITRE 13. Free Access to Vulnerability Database: - Wordfence Intelligence provides free access to a WordPress vulnerability database, including API and Webhook integration. 14. Product Information: - Wordfence Free - Wordfence Premium - Wordfence Care - Wordfence Response - Wordfence CLI - Wordfence Intelligence - Wordfence Central 15. Contact Information: - wfi-support@wordfence.com This information helps users understand the details of the vulnerability, as well as how to fix and mitigate the risks associated with it.