CVE-2024-7626

The WP Delicious – Recipe Plugin for Food Bloggers (formerly Delicious Recipes) plugin for WordPress is vulnerable to arbitrary file movement and reading due to insufficient file path validation in the save_edit_profile_details() function in all versions up to, and including, 1.6.9. This makes it possible for authenticated attackers, with subscriber-level access and above, to move arbitrary files on the server, which can easily lead to remote code execution when the right file is moved (such as wp-config.php). This can also lead to the reading of arbitrary files that may contain sensitive information like wp-config.php.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wpdelicious:wp_delicious:*:*:*:*:*:wordpress:*:*

History

25 Sep 2024, 19:32

Type Values Removed Values Added
References () https://plugins.trac.wordpress.org/browser/delicious-recipes/tags/1.6.7/src/dashboard/class-delicious-recipes-form-handler.php#L260 - () https://plugins.trac.wordpress.org/browser/delicious-recipes/tags/1.6.7/src/dashboard/class-delicious-recipes-form-handler.php#L260 - Product
References () https://plugins.trac.wordpress.org/browser/delicious-recipes/tags/1.6.7/src/dashboard/class-delicious-recipes-form-handler.php#L355 - () https://plugins.trac.wordpress.org/browser/delicious-recipes/tags/1.6.7/src/dashboard/class-delicious-recipes-form-handler.php#L355 - Product
References () https://plugins.trac.wordpress.org/changeset/3148996/delicious-recipes/trunk/src/dashboard/class-delicious-recipes-form-handler.php - () https://plugins.trac.wordpress.org/changeset/3148996/delicious-recipes/trunk/src/dashboard/class-delicious-recipes-form-handler.php - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/3c98bb53-9f7e-4ab3-9676-e3dbfb4a0519?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/3c98bb53-9f7e-4ab3-9676-e3dbfb4a0519?source=cve - Third Party Advisory
CWE NVD-CWE-Other
CPE cpe:2.3:a:wpdelicious:wp_delicious:*:*:*:*:*:wordpress:*:*
First Time Wpdelicious wp Delicious
Wpdelicious

11 Sep 2024, 16:26

Type Values Removed Values Added
Summary
  • (es) El complemento WP Delicious – Recipe Plugin for Food Bloggers (anteriormente Delicious Recipes) para WordPress es vulnerable al movimiento y la lectura arbitrarios de archivos debido a una validación insuficiente de la ruta de archivo en la función save_edit_profile_details() en todas las versiones hasta la 1.6.9 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor y superior, muevan archivos arbitrarios en el servidor, lo que puede conducir fácilmente a la ejecución remota de código cuando se mueve el archivo correcto (como wp-config.php). Esto también puede conducir a la lectura de archivos arbitrarios que pueden contener información confidencial como wp-config.php.

11 Sep 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-09-11 08:15

Updated : 2024-09-25 19:32


NVD link : CVE-2024-7626

Mitre link : CVE-2024-7626

CVE.ORG link : CVE-2024-7626


JSON object : View

Products Affected

wpdelicious

  • wp_delicious
CWE
NVD-CWE-Other CWE-73

External Control of File Name or Path