The ImageRecycle pdf & image compression plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.1.13. This is due to missing or incorrect nonce validation on the reinitialize function. This makes it possible for unauthenticated attackers to remove all plugin data via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Metrics
Affected Vendors & Products
References
History
Tue, 31 Dec 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Imagerecycle
Imagerecycle imagerecycle Pdf \& Image Compression |
|
| Weaknesses | CWE-352 | |
| CPEs | cpe:2.3:a:imagerecycle:imagerecycle_pdf_\&_image_compression:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Imagerecycle
Imagerecycle imagerecycle Pdf \& Image Compression |
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-02-20T18:56:24.094Z
Updated: 2024-08-01T18:33:25.380Z
Reserved: 2024-02-07T21:27:20.605Z
Link: CVE-2024-1339
Updated: 2024-08-01T18:33:25.380Z
Status : Analyzed
Published: 2024-02-29T01:43:48.603
Modified: 2024-12-31T16:52:24.407
Link: CVE-2024-1339
No data.