The ImageRecycle pdf & image compression plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on several AJAX actions in all versions up to, and including, 3.1.14. This makes it possible for authenticated attackers, with Subscriber-level access and above, to perform unauthorized actions, such as updating plugin settings.
References
Configurations
Configuration 1 (hide)
|
History
12 Sep 2024, 20:39
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.3 |
CPE | cpe:2.3:a:imagerecycle:imagerecycle_pdf_\&_image_compression:*:*:*:*:*:wordpress:*:* | |
First Time |
Imagerecycle imagerecycle Pdf \& Image Compression
Imagerecycle |
|
References | () https://plugins.trac.wordpress.org/changeset/3119956/imagerecycle-pdf-image-compression/tags/3.1.15/class/class-image-otimizer.php - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/f330bf36-0a39-40d6-a075-c87fdb9dc2da?source=cve - Third Party Advisory |
26 Aug 2024, 12:47
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
24 Aug 2024, 03:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-08-24 03:15
Updated : 2024-09-12 20:39
NVD link : CVE-2024-6631
Mitre link : CVE-2024-6631
CVE.ORG link : CVE-2024-6631
JSON object : View
Products Affected
imagerecycle
- imagerecycle_pdf_\&_image_compression
CWE
CWE-862
Missing Authorization