Cooked plugin vulnerable to CSRF exploit
CVE-2024-39678
8.8HIGH
Summary
The Cooked recipe plugin for WordPress is susceptible to a Cross-Site Request Forgery (CSRF) attack due to insufficient nonce validation within the AJAX action handler. This flaw allows attackers to deceive users into executing unintended actions while they are authenticated. Users running versions up to and including 1.7.15.4 are at risk. It is crucial for users to upgrade to version 1.8.0 or later to mitigate this vulnerability, as no workarounds exist to protect against this issue.
Affected Version(s)
Cooked < 1.8.0
References
CVSS V3.1
Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published