Unauthorized Data Deletion Vulnerability in Media Hygiene Plugin

CVE-2024-5855
4.3MEDIUM

Key Information

Vendor
Slui
Status
Media Hygiene: Remove Or Delete Unused Images And More!
Vendor
CVE Published:
9 July 2024

Summary

The Media Hygiene: Remove or Delete Unused Images and More! plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the bulk_action_delete and delete_single_image_call AJAX actions in all versions up to, and including, 3.0.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary attachments. A nonce check was added in version 3.0.1, however, it wasn't until version 3.0.2 that a capability check was added.

Affected Version(s)

Media Hygiene: Remove or Delete Unused Images and More! <= 3.0.1

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published.

  • Disclosed

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre Database

Credit

Lucio Sá
.