Lucene search

K
wpvulndbWpvulndbWPVDB-ID:332A0CD4-9BCF-4F49-9501-40CEDDCEC7BF
HistoryJun 18, 2024 - 12:00 a.m.

Cooked – Recipe Management <= Authenticated (Contributor+) Stored Cross-Site Scripting

2024-06-1800:00:00
wpscan.com
7
wordpress
cross-site scripting
stored
vulnerability
input sanitization
output escaping
github
patched version
contributor access

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

AI Score

5.8

Confidence

High

Description The Cooked – Recipe Management recipe plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the _recipe_settings[post_title] parameter in versions up to, and including, 1.7.15.4 due to insufficient input sanitization and output escaping. This vulnerability allows authenticated attackers with contributor-level access and above to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. It appears the patched version is only available on Github at this time.

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

AI Score

5.8

Confidence

High

Related for WPVDB-ID:332A0CD4-9BCF-4F49-9501-40CEDDCEC7BF