The ImageRecycle pdf & image compression plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.1.13. This is due to missing or incorrect nonce validation on the optimizeAllOn function. This makes it possible for unauthenticated attackers to modify image optimization settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Metrics
Affected Vendors & Products
References
History
Tue, 31 Dec 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Imagerecycle
Imagerecycle imagerecycle Pdf \& Image Compression |
|
Weaknesses | CWE-352 | |
CPEs | cpe:2.3:a:imagerecycle:imagerecycle_pdf_\&_image_compression:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Imagerecycle
Imagerecycle imagerecycle Pdf \& Image Compression |

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-08-01T18:33:25.490Z
Reserved: 2024-02-07T21:08:37.324Z
Link: CVE-2024-1336

Updated: 2024-08-01T18:33:25.490Z

Status : Analyzed
Published: 2024-02-29T01:43:48.137
Modified: 2024-12-31T16:51:04.857
Link: CVE-2024-1336

No data.