Cooked Pro

This information is sourced from wpvulnerabilities.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Vulnerabilities

  • Input validation vulnerability in Cooked Pro 1.7.15.4

    Fixed

    The Cooked Pro plugin for WordPress has a security issue where anyone can make changes without permission. This can happen if someone tricks a site administrator into clicking on a link.

    Read More
  • Input validation vulnerability in Cooked Pro 1.7.15.4

    Fixed

    The plugin called Cooked Pro for WordPress has a security issue called Cross-Site Request Forgery. This problem affects all versions up to and including 1.7.15.4. This happens because the plugin does...

    Read More
  • Input validation vulnerability in Cooked Pro 1.7.15.4

    Fixed

    The Cooked Pro plugin for WordPress has a security issue that affects all versions up to 1.7.15.4. This means that attackers who are not logged in can trick a site administrator into performing an ac...

    Read More
  • Output validation vulnerability in Cooked Pro 1.7.15.4

    Fixed

    The Cooked Pro plugin for WordPress has a security issue called HTML Injection. This can happen in all versions up to 1.7.15.4 because the plugin does not properly check the information entered in th...

    Read More
  • Input validation vulnerability in Cooked Pro 1.7.15.4

    Fixed

    A popular plugin for managing recipes on WordPress, called "Cooked", has a security vulnerability that affects all versions up to 1.7.15.4. This vulnerability allows hackers to make unauthorized chan...

    Read More
  • Output validation vulnerability in Cooked Pro 1.7.5.7

    Fixed

    The Cooked Pro plugin for WordPress has a security issue that affects versions up to

    Read More
  • Input validation vulnerability in Cooked Pro 1.7.5.6

    Fixed

    The Cooked Pro plugin for WordPress has a security issue that could let attackers put malicious code into pages. This code will be executed if someone clicks on a link that was sent by the attacker. T...

    Read More