CVE-2024-39679

Source
https://cve.org/CVERecord?id=CVE-2024-39679
Import Source
https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-39679.json
JSON Data
https://api.test.osv.dev/v1/vulns/CVE-2024-39679
Aliases
  • GHSA-2jh3-9939-c4rc
Published
2024-07-17T23:47:51.061Z
Modified
2025-12-01T05:02:25.981881Z
Severity
  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N CVSS Calculator
Summary
WordPress Cooked Plugin - Cross-Site Request Forgery to Recipe Template Reset
Details

Cooked is a recipe plugin for WordPress. The Cooked plugin for WordPress is vulnerable to Cross-Site Request Forgery (CSRF) in versions up to, and including, 1.7.15.4 due to missing or incorrect nonce validation on the AJAX action handler. This vulnerability could allow an attacker to trick users into performing an action they didn't intend to perform under their current authentication. This issue has been addressed in release version 1.8.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-352"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2024/39xxx/CVE-2024-39679.json"
}
References

Affected packages

Git / github.com/xjsv/cooked

Affected ranges

Type
GIT
Repo
https://github.com/xjsv/cooked
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v1.*
v1.7.14
v1.7.15.2
v1.7.15.3
v1.7.15.4

Database specific

source
"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-39679.json"