CVE-2024-1339

The ImageRecycle pdf & image compression plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.1.13. This is due to missing or incorrect nonce validation on the reinitialize function. This makes it possible for unauthenticated attackers to remove all plugin data via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Configurations

Configuration 1 (hide)

cpe:2.3:a:imagerecycle:imagerecycle_pdf_\&_image_compression:*:*:*:*:*:wordpress:*:*

History

31 Dec 2024, 16:52

Type Values Removed Values Added
First Time Imagerecycle
Imagerecycle imagerecycle Pdf \& Image Compression
References () https://plugins.trac.wordpress.org/changeset/3031424/imagerecycle-pdf-image-compression - () https://plugins.trac.wordpress.org/changeset/3031424/imagerecycle-pdf-image-compression - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/2d08e462-8297-477e-89da-47f26bd6beae?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/2d08e462-8297-477e-89da-47f26bd6beae?source=cve - Patch, Third Party Advisory
CPE cpe:2.3:a:imagerecycle:imagerecycle_pdf_\&_image_compression:*:*:*:*:*:wordpress:*:*
CWE CWE-352

Information

Published : 2024-02-29 01:43

Updated : 2024-12-31 16:52


NVD link : CVE-2024-1339

Mitre link : CVE-2024-1339

CVE.ORG link : CVE-2024-1339


JSON object : View

Products Affected

imagerecycle

  • imagerecycle_pdf_\&_image_compression
CWE
CWE-352

Cross-Site Request Forgery (CSRF)