The ImageRecycle pdf & image compression plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.1.13. This is due to missing or incorrect nonce validation on the stopOptimizeAll function. This makes it possible for unauthenticated attackers to modify image optimization settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Metrics
Affected Vendors & Products
References
History
Tue, 31 Dec 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Imagerecycle
Imagerecycle imagerecycle Pdf \& Image Compression |
|
Weaknesses | CWE-352 | |
CPEs | cpe:2.3:a:imagerecycle:imagerecycle_pdf_\&_image_compression:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Imagerecycle
Imagerecycle imagerecycle Pdf \& Image Compression |

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-08-01T18:33:25.380Z
Reserved: 2024-02-07T21:16:39.522Z
Link: CVE-2024-1338

Updated: 2024-08-01T18:33:25.380Z

Status : Analyzed
Published: 2024-02-29T01:43:48.430
Modified: 2024-12-31T16:51:41.113
Link: CVE-2024-1338

No data.