Cross-Site Request Forgery in EWWW Image Optimizer Plugin for WordPress
CVE-2020-36750
4.3MEDIUM
Summary
The EWWW Image Optimizer plugin for WordPress was found to have a vulnerability that allows unauthenticated attackers to exploit Cross-Site Request Forgery due to inadequate nonce validation within the ewww_ngg_bulk_init() function. By tricking a site administrator into clicking a malicious link, attackers could initiate unauthorized bulk image optimization requests, potentially compromising the integrity and performance of the website.
Affected Version(s)
EWWW Image Optimizer * <= 5.8.1
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Jerome Bruandet