The ImageRecycle pdf & image compression plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.1.13. This is due to missing or incorrect nonce validation on the reinitialize function. This makes it possible for unauthenticated attackers to remove all plugin data via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
References
Configurations
Configuration 1 (hide)
|
History
31 Dec 2024, 16:52
Type | Values Removed | Values Added |
---|---|---|
First Time |
Imagerecycle
Imagerecycle imagerecycle Pdf \& Image Compression |
|
References | () https://plugins.trac.wordpress.org/changeset/3031424/imagerecycle-pdf-image-compression - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/2d08e462-8297-477e-89da-47f26bd6beae?source=cve - Patch, Third Party Advisory | |
CPE | cpe:2.3:a:imagerecycle:imagerecycle_pdf_\&_image_compression:*:*:*:*:*:wordpress:*:* | |
CWE | CWE-352 |
Information
Published : 2024-02-29 01:43
Updated : 2024-12-31 16:52
NVD link : CVE-2024-1339
Mitre link : CVE-2024-1339
CVE.ORG link : CVE-2024-1339
JSON object : View
Products Affected
imagerecycle
- imagerecycle_pdf_\&_image_compression
CWE
CWE-352
Cross-Site Request Forgery (CSRF)