The ImageRecycle pdf & image compression plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.1.13. This is due to missing or incorrect nonce validation on the disableOptimization function. This makes it possible for unauthenticated attackers to disable the image optimization setting via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
References
Configurations
Configuration 1 (hide)
|
History
31 Dec 2024, 16:50
Type | Values Removed | Values Added |
---|---|---|
First Time |
Imagerecycle
Imagerecycle imagerecycle Pdf \& Image Compression |
|
CPE | cpe:2.3:a:imagerecycle:imagerecycle_pdf_\&_image_compression:*:*:*:*:*:wordpress:*:* | |
References | () https://plugins.trac.wordpress.org/changeset/3031424/imagerecycle-pdf-image-compression - Product | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/b3900e4f-4ae4-4026-89df-b63bd869a763?source=cve - Third Party Advisory | |
CWE | CWE-352 |
Information
Published : 2024-02-29 01:43
Updated : 2024-12-31 16:50
NVD link : CVE-2024-1335
Mitre link : CVE-2024-1335
CVE.ORG link : CVE-2024-1335
JSON object : View
Products Affected
imagerecycle
- imagerecycle_pdf_\&_image_compression
CWE
CWE-352
Cross-Site Request Forgery (CSRF)