Description
The WP Delicious – Recipe Plugin for Food Bloggers (formerly Delicious Recipes) plugin for WordPress is vulnerable to arbitrary file movement and reading due to insufficient file path validation in the save_edit_profile_details() function in all versions up to, and including, 1.6.9. This makes it possible for authenticated attackers, with subscriber-level access and above, to move arbitrary files on the server, which can easily lead to remote code execution when the right file is moved (such as wp-config.php). This can also lead to the reading of arbitrary files that may contain sensitive information like wp-config.php.
Published: 2024-09-11
Score: 8.1 High
EPSS: 3.8% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2024-48515 The WP Delicious – Recipe Plugin for Food Bloggers (formerly Delicious Recipes) plugin for WordPress is vulnerable to arbitrary file movement and reading due to insufficient file path validation in the save_edit_profile_details() function in all versions up to, and including, 1.6.9. This makes it possible for authenticated attackers, with subscriber-level access and above, to move arbitrary files on the server, which can easily lead to remote code execution when the right file is moved (such as wp-config.php). This can also lead to the reading of arbitrary files that may contain sensitive information like wp-config.php.
History

Wed, 25 Sep 2024 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Wpdelicious wp Delicious
Weaknesses NVD-CWE-Other
CPEs cpe:2.3:a:wpdelicious:wp_delicious:*:*:*:*:*:wordpress:*:*
Vendors & Products Wpdelicious wp Delicious

Wed, 11 Sep 2024 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Wpdelicious
Wpdelicious wpdelicious
CPEs cpe:2.3:a:wpdelicious:wpdelicious:*:*:*:*:*:*:*:*
Vendors & Products Wpdelicious
Wpdelicious wpdelicious
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 11 Sep 2024 07:45:00 +0000

Type Values Removed Values Added
Description The WP Delicious – Recipe Plugin for Food Bloggers (formerly Delicious Recipes) plugin for WordPress is vulnerable to arbitrary file movement and reading due to insufficient file path validation in the save_edit_profile_details() function in all versions up to, and including, 1.6.9. This makes it possible for authenticated attackers, with subscriber-level access and above, to move arbitrary files on the server, which can easily lead to remote code execution when the right file is moved (such as wp-config.php). This can also lead to the reading of arbitrary files that may contain sensitive information like wp-config.php.
Title WP Delicious – Recipe Plugin for Food Bloggers (formerly Delicious Recipes) <= 1.6.9 - Improper Path Validation to Authenticated (Subscriber+) Arbitrary File Move and Read
Weaknesses CWE-73
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}


Subscriptions

Wpdelicious Wp Delicious Wpdelicious
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:47:28.700Z

Reserved: 2024-08-08T19:19:50.185Z

Link: CVE-2024-7626

cve-icon Vulnrichment

Updated: 2024-09-11T15:03:55.026Z

cve-icon NVD

Status : Analyzed

Published: 2024-09-11T08:15:01.950

Modified: 2024-09-25T19:32:57.807

Link: CVE-2024-7626

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses