Unauthenticated attackers can delete arbitrary option values on WordPress site, leading to denial of service
CVE-2024-10855

8.1HIGH

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
20 November 2024

Summary

The Sirv plugin for WordPress, specifically versions up to and including 7.3.0, contains a vulnerability that allows authenticated users with Contributor-level access and above to modify data inappropriately. This occurs due to insufficient validation on the filename parameter in the sirv_upload_file_by_chunks() function. The flaw enables attackers to delete arbitrary option values within the WordPress site. Such unauthorized modifications can lead to the deletion of options that might cause errors on the site, effectively resulting in denial of service for legitimate users and impacting the overall functionality of the website.

Affected Version(s)

Image Optimizer, Resizer and CDN – Sirv * <= 7.3.0

References

CVSS V3.1

Score:
8.1
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Arkadiusz Hydzik
.