Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2024-49291 β€” AI Deep Analysis Summary

CVSS 10.0 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Unrestricted file upload in Cooked Pro. πŸ’₯ **Consequences**: Attackers can upload malicious files (e.g., webshells). This leads to full server compromise, data theft, and site defacement.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: CWE-434 (Unrestricted Upload of File with Dangerous Type). The plugin fails to validate file types or extensions before saving them to the server. It trusts user input blindly.

Q3Who is affected? (Versions/Components)

πŸ“¦ **Affected**: WordPress Plugin **Cooked Pro**. πŸ“… **Version**: Before **1.8.0**. 🏒 **Vendor**: Gora Tech LLC. Any site running older versions is at risk.

Q4What can hackers do? (Privileges/Data)

πŸ”“ **Capabilities**: Upload arbitrary files. πŸ“‚ **Data Access**: Read/Write server files. πŸ’» **Privileges**: Execute code via uploaded scripts (e.g., PHP shells). Full remote code execution potential.

Q5Is exploitation threshold high? (Auth/Config)

⚑ **Threshold**: LOW. πŸ”‘ **Auth**: Unauthenticated (PR:N). πŸ–±οΈ **UI**: No user interaction needed (UI:N). 🌐 **Network**: Remote (AV:N). Easy to exploit from anywhere.

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ” **Exploit Status**: Public references exist (Patchstack). While specific PoC code isn't listed in the JSON, the vulnerability is well-documented. Wild exploitation is likely given the low barrier.

Q7How to self-check? (Features/Scanning)

πŸ”Ž **Self-Check**: Scan for **Cooked Pro** plugin. Check version number. If < 1.8.0, you are vulnerable. Look for suspicious file uploads in the plugin's upload directory.

Q8Is it fixed officially? (Patch/Mitigation)

🩹 **Fix**: Upgrade to **Cooked Pro 1.8.0** or later. The vendor (Gora Tech LLC) has addressed the unrestricted upload flaw in the patched version.

Q9What if no patch? (Workaround)

🚧 **No Patch?**: Disable the plugin immediately. πŸ›‘ Remove file upload capabilities if possible. 🧱 Use WAF rules to block uploads of executable extensions (.php, .exe). Monitor server logs closely.

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Urgency**: CRITICAL. CVSS Score is High (9.8 implied by vector). Unauthenticated RCE risk. Patch immediately to prevent server takeover. Do not delay.