[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fX6C8iGwQ26yl_ucl-4G_jqz3HGMHAMVwPRCi4l4L5dM":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2025-62897","wp-recipe-maker-unauthenticated-arbitrary-shortcode-execution","WP Recipe Maker \u003C 10.1.0 - Unauthenticated Arbitrary Shortcode Execution","The The WP Recipe Maker plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to 10.1.0 (exclusive). This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes.","wp-recipe-maker",null,"\u003C10.1.0","10.1.0","medium",5.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:N\u002FI:L\u002FA:N","Improper Control of Generation of Code ('Code Injection')","2025-09-26 00:00:00","2025-10-29 16:46:28",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F0a1fa859-e06c-4ce2-9325-e0be01882a88?source=api-prod",34]