The Basil recipe theme for WordPress is vulnerable to Persistent Cross-Site Scripting (XSS) via the `post_title` parameter in versions up to, and including, 2.0.4 due to insufficient input sanitization and output escaping. This vulnerability allows authenticated attackers with contributor-level access and above to inject arbitrary web scripts in pages that will execute whenever a user accesses a compromised page. Because the of the default WordPress validation, it is not possible to insert the payload directly but if the Cooked plugin is installed, it is possible to create a recipe post type (cp_recipe) and inject the payload in the title field. Version 2.0.5 contains a patch for the issue.
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2024-07-01T21:19:35.867Z

Updated: 2024-08-02T04:19:20.713Z

Reserved: 2024-06-21T18:15:22.260Z

Link: CVE-2024-39310

cve-icon Vulnrichment

Updated: 2024-07-03T19:46:12.627Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-07-01T22:15:03.483

Modified: 2024-07-02T12:09:16.907

Link: CVE-2024-39310

cve-icon Redhat

No data.