Unauthorized Data Deletion Vulnerability in Media Hygiene Plugin
CVE-2024-5855
4.3MEDIUM
Key Information
- Vendor
- Slui
- Status
- Media Hygiene: Remove Or Delete Unused Images And More!
- Vendor
- CVE Published:
- 9 July 2024
Summary
The Media Hygiene: Remove or Delete Unused Images and More! plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the bulk_action_delete and delete_single_image_call AJAX actions in all versions up to, and including, 3.0.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary attachments. A nonce check was added in version 3.0.1, however, it wasn't until version 3.0.2 that a capability check was added.
Affected Version(s)
Media Hygiene: Remove or Delete Unused Images and More! <= 3.0.1
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published.
Disclosed
Vulnerability Reserved.
Collectors
NVD DatabaseMitre Database
Credit
Lucio Sá