Unauthenticated attackers can delete arbitrary option values on WordPress site, leading to denial of service
CVE-2024-10855
8.1HIGH
Key Information:
- Vendor
- Wordpress
- Vendor
- CVE Published:
- 20 November 2024
Summary
The Sirv plugin for WordPress, specifically versions up to and including 7.3.0, contains a vulnerability that allows authenticated users with Contributor-level access and above to modify data inappropriately. This occurs due to insufficient validation on the filename parameter in the sirv_upload_file_by_chunks() function. The flaw enables attackers to delete arbitrary option values within the WordPress site. Such unauthorized modifications can lead to the deletion of options that might cause errors on the site, effectively resulting in denial of service for legitimate users and impacting the overall functionality of the website.
Affected Version(s)
Image Optimizer, Resizer and CDN – Sirv * <= 7.3.0
References
CVSS V3.1
Score:
8.1
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Arkadiusz Hydzik