CVE-2024-39678

Source
https://cve.org/CVERecord?id=CVE-2024-39678
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-39678.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2024-39678
Aliases
  • GHSA-pp3h-ghxf-r9pc
Published
2024-07-17T23:43:32.484Z
Modified
2025-12-05T05:20:20.857104Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N CVSS Calculator
Summary
WordPress Cooked Plugin - Cross-Site Request Forgery to Get Recipe IDs
Details

Cooked is a recipe plugin for WordPress. The Cooked plugin is vulnerable to Cross-Site Request Forgery (CSRF) in versions up to, and including, 1.7.15.4 due to missing or incorrect nonce validation on the AJAX action handler. This vulnerability could allow an attacker to trick users into performing an action they didn't intend to perform under their current authentication. This issue has been addressed in release version 1.8.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Database specific
{
    "cwe_ids": [
        "CWE-352"
    ],
    "cna_assigner": "GitHub_M",
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/39xxx/CVE-2024-39678.json"
}
References

Affected packages

Git / github.com/xjsv/cooked

Affected ranges

Type
GIT
Repo
https://github.com/xjsv/cooked
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v1.*
v1.7.14
v1.7.15.2
v1.7.15.3
v1.7.15.4

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2024-39678.json"