{"vulnerability": "CVE-2024-39678", "sightings": [{"uuid": "197774a5-604b-4ad5-97f9-d74ef462e0e4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39678", "type": "seen", "source": "https://t.me/cvedetector/1134", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-39678 - Cooked WordPress CSRF Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2024-39678 \nPublished : July 18, 2024, 1:15 a.m. | 42\u00a0minutes ago \nDescription : Cooked is a recipe plugin for WordPress. The Cooked plugin is vulnerable to Cross-Site Request Forgery (CSRF) in versions up to, and including, 1.7.15.4 due to missing or incorrect nonce validation on the AJAX action handler. This vulnerability could allow an attacker to trick users into performing an action they didn't intend to perform under their current authentication. This issue has been addressed in release version 1.8.0. Users are advised to upgrade. There are no known workarounds for this vulnerability. \nSeverity: 4.3 | MEDIUM \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"18 Jul 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-07-18T04:15:38.000000Z"}, {"uuid": "f7110542-416a-432d-8d6f-3b274ee264ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-39678", "type": "seen", "source": "Telegram/X-iiMcmbKZEdTOtLK9-DS5EMdqyQU0S4m4A2CR5zBlWLC_Ak", "content": "", "creation_timestamp": "2025-02-14T09:47:00.000000Z"}]}