CVE-2024-7626: CWE-73 External Control of File Name or Path in wpdelicious WP Delicious – Recipe Plugin for Food Bloggers (formerly Delicious Recipes)
CVE-2024-7626 is a high-severity vulnerability in the WP Delicious – Recipe Plugin for Food Bloggers (formerly Delicious Recipes) WordPress plugin, affecting all versions up to 1. 6. 9. It allows authenticated users with subscriber-level access or higher to move arbitrary files on the server due to insufficient validation of file paths in the save_edit_profile_details() function. This flaw can lead to remote code execution if critical files like wp-config. php are moved, and also permits reading sensitive files. Exploitation requires no user interaction but does require authentication with low privileges. There are no known exploits in the wild yet. The vulnerability poses a significant risk to WordPress sites using this plugin, potentially compromising confidentiality and integrity without impacting availability. Immediate patching or mitigation is recommended to prevent unauthorized file manipulation and potential server takeover.
AI Analysis
Technical Summary
CVE-2024-7626 is a vulnerability classified under CWE-73 (External Control of File Name or Path) found in the WP Delicious – Recipe Plugin for Food Bloggers, a WordPress plugin used for managing recipe content. The vulnerability exists in the save_edit_profile_details() function, which fails to properly validate file paths supplied by authenticated users. This allows an attacker with subscriber-level privileges or higher to specify arbitrary file paths for moving files on the server. By exploiting this, an attacker can move sensitive files such as wp-config.php, which contains database credentials and other critical configuration data. Moving such files can lead to remote code execution (RCE) if the attacker replaces or relocates files in a way that the server executes malicious code. Additionally, the vulnerability allows reading arbitrary files, exposing sensitive information. The CVSS v3.1 base score is 8.1 (high), reflecting the network attack vector, low attack complexity, and the requirement for low privileges but no user interaction. The scope is unchanged, meaning the vulnerability affects the same security domain. No patches or fixes have been officially released at the time of this report, and no known exploits have been observed in the wild. The plugin is widely used among food bloggers and WordPress sites focused on recipe content, making affected installations potentially numerous.
Potential Impact
The impact of CVE-2024-7626 is significant for organizations running WordPress sites with the vulnerable WP Delicious plugin. Attackers with minimal privileges can escalate their access by moving critical files, potentially leading to full server compromise through remote code execution. Confidentiality is at high risk due to the ability to read sensitive files like wp-config.php, which may contain database credentials and API keys. Integrity is also compromised as attackers can manipulate files, potentially injecting malicious code or disrupting site functionality. Although availability is not directly impacted, the resulting compromise could lead to site defacement or downtime. Organizations relying on this plugin for content management, especially those handling sensitive user data or business-critical operations, face increased risk of data breaches, unauthorized access, and reputational damage. The ease of exploitation combined with the low privilege requirement makes this vulnerability attractive to attackers targeting WordPress ecosystems.
Mitigation Recommendations
To mitigate CVE-2024-7626, organizations should: 1) Immediately audit WordPress sites for the presence of the WP Delicious – Recipe Plugin and identify versions up to 1.6.9. 2) Disable or remove the plugin if an official patch is not yet available to prevent exploitation. 3) Monitor user roles and permissions carefully, restricting subscriber-level access where possible and reviewing user accounts for suspicious activity. 4) Implement Web Application Firewall (WAF) rules to detect and block suspicious file path manipulation attempts targeting the vulnerable function. 5) Harden file system permissions to prevent unauthorized file moves or modifications by the web server user. 6) Regularly back up WordPress sites and configuration files to enable recovery in case of compromise. 7) Stay alert for official patches or updates from the vendor and apply them promptly once released. 8) Conduct security scans and penetration tests focusing on file path traversal and arbitrary file manipulation vulnerabilities. These steps go beyond generic advice by focusing on immediate plugin removal, permission hardening, and proactive monitoring tailored to this specific vulnerability.
Affected Countries
United States, United Kingdom, Canada, Australia, Germany, France, India, Brazil, Netherlands, Italy, Spain
CVE-2024-7626: CWE-73 External Control of File Name or Path in wpdelicious WP Delicious – Recipe Plugin for Food Bloggers (formerly Delicious Recipes)
Description
CVE-2024-7626 is a high-severity vulnerability in the WP Delicious – Recipe Plugin for Food Bloggers (formerly Delicious Recipes) WordPress plugin, affecting all versions up to 1. 6. 9. It allows authenticated users with subscriber-level access or higher to move arbitrary files on the server due to insufficient validation of file paths in the save_edit_profile_details() function. This flaw can lead to remote code execution if critical files like wp-config. php are moved, and also permits reading sensitive files. Exploitation requires no user interaction but does require authentication with low privileges. There are no known exploits in the wild yet. The vulnerability poses a significant risk to WordPress sites using this plugin, potentially compromising confidentiality and integrity without impacting availability. Immediate patching or mitigation is recommended to prevent unauthorized file manipulation and potential server takeover.
AI-Powered Analysis
Technical Analysis
CVE-2024-7626 is a vulnerability classified under CWE-73 (External Control of File Name or Path) found in the WP Delicious – Recipe Plugin for Food Bloggers, a WordPress plugin used for managing recipe content. The vulnerability exists in the save_edit_profile_details() function, which fails to properly validate file paths supplied by authenticated users. This allows an attacker with subscriber-level privileges or higher to specify arbitrary file paths for moving files on the server. By exploiting this, an attacker can move sensitive files such as wp-config.php, which contains database credentials and other critical configuration data. Moving such files can lead to remote code execution (RCE) if the attacker replaces or relocates files in a way that the server executes malicious code. Additionally, the vulnerability allows reading arbitrary files, exposing sensitive information. The CVSS v3.1 base score is 8.1 (high), reflecting the network attack vector, low attack complexity, and the requirement for low privileges but no user interaction. The scope is unchanged, meaning the vulnerability affects the same security domain. No patches or fixes have been officially released at the time of this report, and no known exploits have been observed in the wild. The plugin is widely used among food bloggers and WordPress sites focused on recipe content, making affected installations potentially numerous.
Potential Impact
The impact of CVE-2024-7626 is significant for organizations running WordPress sites with the vulnerable WP Delicious plugin. Attackers with minimal privileges can escalate their access by moving critical files, potentially leading to full server compromise through remote code execution. Confidentiality is at high risk due to the ability to read sensitive files like wp-config.php, which may contain database credentials and API keys. Integrity is also compromised as attackers can manipulate files, potentially injecting malicious code or disrupting site functionality. Although availability is not directly impacted, the resulting compromise could lead to site defacement or downtime. Organizations relying on this plugin for content management, especially those handling sensitive user data or business-critical operations, face increased risk of data breaches, unauthorized access, and reputational damage. The ease of exploitation combined with the low privilege requirement makes this vulnerability attractive to attackers targeting WordPress ecosystems.
Mitigation Recommendations
To mitigate CVE-2024-7626, organizations should: 1) Immediately audit WordPress sites for the presence of the WP Delicious – Recipe Plugin and identify versions up to 1.6.9. 2) Disable or remove the plugin if an official patch is not yet available to prevent exploitation. 3) Monitor user roles and permissions carefully, restricting subscriber-level access where possible and reviewing user accounts for suspicious activity. 4) Implement Web Application Firewall (WAF) rules to detect and block suspicious file path manipulation attempts targeting the vulnerable function. 5) Harden file system permissions to prevent unauthorized file moves or modifications by the web server user. 6) Regularly back up WordPress sites and configuration files to enable recovery in case of compromise. 7) Stay alert for official patches or updates from the vendor and apply them promptly once released. 8) Conduct security scans and penetration tests focusing on file path traversal and arbitrary file manipulation vulnerabilities. These steps go beyond generic advice by focusing on immediate plugin removal, permission hardening, and proactive monitoring tailored to this specific vulnerability.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-08-08T19:19:50.185Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c1cb7ef31ef0b560034
Added to database: 2/25/2026, 9:39:40 PM
Last enriched: 2/26/2026, 3:45:34 AM
Last updated: 2/26/2026, 7:55:47 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.