The WP Delicious – Recipe Plugin for Food Bloggers (formerly Delicious Recipes) plugin for WordPress is vulnerable to arbitrary file movement and reading due to insufficient file path validation in the save_edit_profile_details() function in all versions up to, and including, 1.6.9. This makes it possible for authenticated attackers, with subscriber-level access and above, to move arbitrary files on the server, which can easily lead to remote code execution when the right file is moved (such as wp-config.php). This can also lead to the reading of arbitrary files that may contain sensitive information like wp-config.php.
References
Configurations
History
25 Sep 2024, 19:32
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-Other | |
CPE | cpe:2.3:a:wpdelicious:wp_delicious:*:*:*:*:*:wordpress:*:* | |
First Time |
Wpdelicious wp Delicious
Wpdelicious |
|
References | () https://plugins.trac.wordpress.org/browser/delicious-recipes/tags/1.6.7/src/dashboard/class-delicious-recipes-form-handler.php#L260 - Product | |
References | () https://plugins.trac.wordpress.org/browser/delicious-recipes/tags/1.6.7/src/dashboard/class-delicious-recipes-form-handler.php#L355 - Product | |
References | () https://plugins.trac.wordpress.org/changeset/3148996/delicious-recipes/trunk/src/dashboard/class-delicious-recipes-form-handler.php - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/3c98bb53-9f7e-4ab3-9676-e3dbfb4a0519?source=cve - Third Party Advisory |
11 Sep 2024, 16:26
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
11 Sep 2024, 08:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-09-11 08:15
Updated : 2024-09-25 19:32
NVD link : CVE-2024-7626
Mitre link : CVE-2024-7626
CVE.ORG link : CVE-2024-7626
JSON object : View
Products Affected
wpdelicious
- wp_delicious
CWE