The ImageRecycle pdf & image compression plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.1.13. This is due to missing or incorrect nonce validation on the reinitialize function. This makes it possible for unauthenticated attackers to remove all plugin data via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Metrics
Affected Vendors & Products
References
History
Tue, 31 Dec 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Imagerecycle
Imagerecycle imagerecycle Pdf \& Image Compression |
|
Weaknesses | CWE-352 | |
CPEs | cpe:2.3:a:imagerecycle:imagerecycle_pdf_\&_image_compression:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Imagerecycle
Imagerecycle imagerecycle Pdf \& Image Compression |

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-08-01T18:33:25.380Z
Reserved: 2024-02-07T21:27:20.605Z
Link: CVE-2024-1339

Updated: 2024-08-01T18:33:25.380Z

Status : Analyzed
Published: 2024-02-29T01:43:48.603
Modified: 2024-12-31T16:52:24.407
Link: CVE-2024-1339

No data.