CVE-2024-7626
📋 TL;DR
This vulnerability in the WP Delicious Recipe Plugin allows authenticated attackers with subscriber-level access or higher to move and read arbitrary files on the server. This can lead to remote code execution by moving critical files like wp-config.php or reading sensitive information. All WordPress sites using this plugin up to version 1.6.9 are affected.
💻 Affected Systems
- WP Delicious – Recipe Plugin for Food Bloggers (formerly Delicious Recipes)
📦 What is this software?
Wp Delicious by Wpdelicious
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete site compromise, data theft, and server takeover.
Likely Case
Sensitive file disclosure (database credentials, API keys) and potential privilege escalation.
If Mitigated
Limited impact if proper file permissions and network segmentation are in place.
🎯 Exploit Status
Exploitation requires authenticated access but is straightforward once credentials are obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.7.0 or later
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3148996/delicious-recipes/trunk/src/dashboard/class-delicious-recipes-form-handler.php
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Go to Plugins → Installed Plugins. 3. Find 'WP Delicious Recipe Plugin'. 4. Click 'Update Now' if available. 5. If no update appears, manually download version 1.7.0+ from WordPress.org and replace the plugin files.
🔧 Temporary Workarounds
Disable Plugin
allTemporarily disable the vulnerable plugin until patched.
wp plugin deactivate delicious-recipes
Restrict User Registration
allDisable new user registration to prevent attacker account creation.
Settings → General → Membership: Uncheck 'Anyone can register'
🧯 If You Can't Patch
- Implement strict file permissions (wp-config.php should be 400 or 440)
- Add web application firewall rules to block file manipulation requests
🔍 How to Verify
Check if Vulnerable:
Check plugin version in WordPress admin → Plugins → Installed Plugins. If version is 1.6.9 or lower, you are vulnerable.
Check Version:
wp plugin get delicious-recipes --field=version
Verify Fix Applied:
Confirm plugin version is 1.7.0 or higher. Test authenticated user file upload functionality.
📡 Detection & Monitoring
Log Indicators:
- POST requests to /wp-admin/admin-ajax.php with action=delicious_recipes_save_edit_profile_details
- Unusual file operations in web server logs
- Failed file read/move attempts
Network Indicators:
- Unusual file upload patterns from authenticated users
- Requests attempting to access wp-config.php
SIEM Query:
source="web_logs" AND (uri="/wp-admin/admin-ajax.php" AND post_data LIKE "%delicious_recipes_save_edit_profile_details%")
🔗 References
- https://plugins.trac.wordpress.org/browser/delicious-recipes/tags/1.6.7/src/dashboard/class-delicious-recipes-form-handler.php#L260
- https://plugins.trac.wordpress.org/browser/delicious-recipes/tags/1.6.7/src/dashboard/class-delicious-recipes-form-handler.php#L355
- https://plugins.trac.wordpress.org/changeset/3148996/delicious-recipes/trunk/src/dashboard/class-delicious-recipes-form-handler.php
- https://www.wordfence.com/threat-intel/vulnerabilities/id/3c98bb53-9f7e-4ab3-9676-e3dbfb4a0519?source=cve