// For flags

CVE-2024-39680

WordPress Cooked Plugin - Cross-Site Request Forgery to Default Recipe Template Save

Severity Score

5.4
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track*
*SSVC
Descriptions

Cooked is a recipe plugin for WordPress. The Cooked plugin for WordPress is vulnerable to Cross-Site Request Forgery (CSRF) in versions up to, and including, 1.7.15.4 due to missing or incorrect nonce validation on the AJAX action handler. This vulnerability could allow an attacker to trick users into performing an action they didn't intend to perform under their current authentication. This issue has been addressed in release version 1.8.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Cooked es un complemento de recetas para WordPress. El complemento Cooked para WordPress es vulnerable a la Cross-Site Request Forgery (CSRF) en versiones hasta la 1.7.15.4 incluida debido a una validación nonce faltante o incorrecta en el controlador de acciones AJAX. Esta vulnerabilidad podría permitir a un atacante engañar a los usuarios para que realicen una acción que no pretendían realizar con su autenticación actual. Este problema se solucionó en la versión 1.8.0. Se recomienda a los usuarios que actualicen. No se conocen workarounds para esta vulnerabilidad.

The Cooked – Recipe Management plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.7.15.4. This is due to missing or incorrect nonce validation on the cooked_save_default AJAX action. This makes it possible for unauthenticated attackers to update the default_content value via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

*Credits: RE-ALTER
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
Low
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track*
Exploitation
Poc
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2024-06-27 CVE Reserved
  • 2024-07-17 CVE Published
  • 2024-07-18 EPSS Updated
  • 2024-08-09 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-352: Cross-Site Request Forgery (CSRF)
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
XjSv
Search vendor "XjSv"
Cooked
Search vendor "XjSv" for product "Cooked"
< 1.8.0
Search vendor "XjSv" for product "Cooked" and version " < 1.8.0"
en
Affected