The ImageRecycle pdf & image compression plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.1.13. This is due to missing or incorrect nonce validation on the reinitialize function. This makes it possible for unauthenticated attackers to remove all plugin data via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Metrics
Affected Vendors & Products
References
History
Wed, 08 Apr 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | ImageRecycle pdf & image compression <= 3.1.13 - Cross-Site Request Forgery to Plugin Data Removal in reinitialize |
Wed, 25 Feb 2026 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 31 Dec 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Imagerecycle
Imagerecycle imagerecycle Pdf \& Image Compression |
|
| Weaknesses | CWE-352 | |
| CPEs | cpe:2.3:a:imagerecycle:imagerecycle_pdf_\&_image_compression:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Imagerecycle
Imagerecycle imagerecycle Pdf \& Image Compression |
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T16:44:03.050Z
Reserved: 2024-02-07T21:27:20.605Z
Link: CVE-2024-1339
Updated: 2024-08-01T18:33:25.380Z
Status : Modified
Published: 2024-02-29T01:43:48.603
Modified: 2026-04-08T17:18:18.743
Link: CVE-2024-1339
No data.
OpenCVE Enrichment
No data.