Impact
The vulnerability is a cross‑site request forgery flaw in the ZipList Recipe plugin for WordPress, affecting all releases up to and including version 3.1. It permits an attacker to trigger the plugin to carry out privileged actions on behalf of a user who is authenticated to the site, potentially altering or deleting content. The flaw is identified by CWE‑352 and could enable unauthorized changes without the user’s consent.
Affected Systems
Affected systems comprise the WordPress ZipList Recipe plugin developed by Condenast. The plugin is vulnerable in all releases up to and including version 3.1. Upgrading to a newer release eliminates the flaw.
Risk and Exploitability
The CVSS score is 4.3, indicating moderate impact. The EPSS score is below 1 %, suggesting a low likelihood of exploitation. The vulnerability is not listed in CISA’s KEV catalog. Exploitation likely requires the target user to be logged into the site and a malicious page to issue a crafted request, which could be achieved via an innocuous link or image. Because no confirmed exploits have been reported, the risk level is moderate but the probability is low.
OpenCVE Enrichment
EUVD