CVE-2023-44477 – WordPress Cooked Plugin <= 1.7.13 is vulnerable to Cross Site Scripting (XSS)
https://notcve.org/view.php?id=CVE-2023-44477
Auth. (contributor+) Stored Cross-Site Scripting (XSS) vulnerability in Boxy Studio Cooked plugin <= 1.7.13 versions. Vulnerabilidad de Coss-Site Scripting (XSS) autenticada (con permisos de colaboradores o superiores) almacenada en el complemento Boxy Studio Cooked en versiones <= 1.7.13. The Cooked plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 1.7.14 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. • https://patchstack.com/database/vulnerability/cooked/wordpress-cooked-plugin-1-7-13-cross-site-scripting-xss-vulnerability?_s_id=cve • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •
CVE-2022-36399 – WordPress Booked Plugin < 2.4.4 is vulnerable to Sensitive Data Exposure
https://notcve.org/view.php?id=CVE-2022-36399
Exposure of Sensitive Information to an Unauthorized Actor vulnerability in BoxyStudio Booked - Appointment Booking for WordPress | Calendars.This issue affects Booked - Appointment Booking for WordPress | Calendars: from n/a before 2.4.4. Vulnerabilidad de exposición de información confidencial a un actor no autorizado en BoxyStudio Booked - Appointment Booking for WordPress | Calendars. Este problema afecta a Booked - Appointment Booking for WordPress | Calendars: desde n/a antes de 2.4.4. The Booked plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 2.4. This can allow unauthenticated attackers to extract sensitive appointment-related data from the database. • https://patchstack.com/database/vulnerability/booked/wordpress-booked-plugin-2-4-unauth-appointment-data-exposure-vulnerability?_s_id=cve • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor •
CVE-2022-3900 – Cooked Pro < 1.7.5.7 - Unauthenticated PHP Object Injection
https://notcve.org/view.php?id=CVE-2022-3900
The Cooked Pro WordPress plugin before 1.7.5.7 does not properly validate or sanitize the recipe_args parameter before unserializing it in the cooked_loadmore action, allowing an unauthenticated attacker to trigger a PHP Object injection vulnerability. El complemento Cooked Pro de WordPress anterior a 1.7.5.7 no valida ni sanitiza adecuadamente el parámetro recipe_args antes de deserializarlo en la acción cooked_loadmore, lo que permite que un atacante no autenticado desencadene una vulnerabilidad de inyección de objetos PHP. The Cooked Pro plugin for WordPress is vulnerable to PHP Object Injection in versions up to, but not including, 1.7.5.7 via deserialization of untrusted input from the recipe_args parameter. This allows unauthenticated attackers to inject a PHP Object. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code. • https://wpscan.com/vulnerability/c969c4bc-82d7-46a0-88ba-e056c0b27de7 • CWE-502: Deserialization of Untrusted Data •
CVE-2021-24233 – Cooked Pro < 1.7.5.6 - Unauthenticated Reflected Cross Site Scripting (XSS)
https://notcve.org/view.php?id=CVE-2021-24233
The Cooked Pro WordPress plugin before 1.7.5.6 was affected by unauthenticated reflected Cross-Site Scripting issues, due to improper sanitisation of user input while being output back in pages as an arbitrary attribute. El plugin Cooked Pro WordPress versiones anteriores a 1.7.5.6 estuvo afectado por problemas de tipo Cross-Site Scripting reflejado no autenticado, debido a un saneamiento inapropiado de la entrada del usuario mientras se devuelve a las páginas como un atributo arbitrario The Cooked Pro plugin for WordPress is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 1.7.5.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. • https://wpscan.com/vulnerability/ed620de5-1ad2-4480-b08b-719480472bc0 https://www.getastra.com/blog/911/reflected-xss-found-in-cooked-pro-recipe-plugin-for-wordpress https://www.jinsonvarghese.com/reflected-xss-vulnerability-found-in-cooked-pro-plugin • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •