The Cooked Pro WordPress plugin before 1.7.5.7 does not properly validate or sanitize the recipe_args parameter before unserializing it in the cooked_loadmore action, allowing an unauthenticated attacker to trigger a PHP Object injection vulnerability.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 22 Apr 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2025-04-22T14:43:41.505Z
Reserved: 2022-11-08T20:34:47.835Z
Link: CVE-2022-3900
Updated: 2024-08-03T01:20:58.476Z
Status : Modified
Published: 2022-12-12T18:15:11.410
Modified: 2025-04-22T15:16:00.807
Link: CVE-2022-3900
No data.
OpenCVE Enrichment
No data.
Weaknesses
No weakness.