CVE-2024-7626

The WP Delicious – Recipe Plugin for Food Bloggers (formerly Delicious Recipes) plugin for WordPress is vulnerable to arbitrary file movement and reading due to insufficient file path validation in the save_edit_profile_details() function in all versions up to, and including, 1.6.9. This makes it possible for authenticated attackers, with subscriber-level access and above, to move arbitrary files on the server, which can easily lead to remote code execution when the right file is moved (such as wp-config.php). This can also lead to the reading of arbitrary files that may contain sensitive information like wp-config.php.
Configurations

Configuration 1 (hide)

cpe:2.3:a:wpdelicious:wp_delicious:*:*:*:*:*:wordpress:*:*

History

No history.

Information

Published : 2024-09-11 08:15

Updated : 2024-09-25 19:32


NVD link : CVE-2024-7626

Mitre link : CVE-2024-7626

CVE.ORG link : CVE-2024-7626


JSON object : View

Products Affected

wpdelicious

  • wp_delicious
CWE
CWE-73

External Control of File Name or Path

NVD-CWE-Other