The Basil recipe theme for WordPress is vulnerable to Persistent Cross-Site Scripting (XSS) via the `post_title` parameter in versions up to, and including, 2.0.4 due to insufficient input sanitization and output escaping. This vulnerability allows authenticated attackers with contributor-level access and above to inject arbitrary web scripts in pages that will execute whenever a user accesses a compromised page. Because the of the default WordPress validation, it is not possible to insert the payload directly but if the Cooked plugin is installed, it is possible to create a recipe post type (cp_recipe) and inject the payload in the title field. Version 2.0.5 contains a patch for the issue.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: GitHub_M
Published: 2024-07-01T21:19:35.867Z
Updated: 2024-08-02T04:19:20.713Z
Reserved: 2024-06-21T18:15:22.260Z
Link: CVE-2024-39310
Vulnrichment
Updated: 2024-07-03T19:46:12.627Z
NVD
Status : Awaiting Analysis
Published: 2024-07-01T22:15:03.483
Modified: 2024-11-21T09:27:26.120
Link: CVE-2024-39310
Redhat
No data.