Arbitrary File Movement and Reading Vulnerability in WP Delicious Recipe Plugin for Food Bloggers
CVE-2024-7626
8.1HIGH
Key Information:
- Vendor
- Wordpress
- Vendor
- CVE Published:
- 11 September 2024
Summary
The WP Delicious – Recipe Plugin for Food Bloggers has a vulnerability that stems from insufficient file path validation in the save_edit_profile_details() function. This flaw allows authenticated users with subscriber-level access or higher to manipulate files on the server. Attackers may exploit this vulnerability to move critical files, such as wp-config.php, leading to possible remote code execution. In addition, the vulnerability presents a risk of accessing sensitive files that may contain confidential information, amplifying the security risk for WordPress sites utilizing this plugin.
Affected Version(s)
WP Delicious – Recipe Plugin for Food Bloggers (formerly Delicious Recipes) * <= 1.6.9
References
CVSS V3.1
Score:
8.1
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Connor Billings