The Media Hygiene: Remove or Delete Unused Images and More! plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the bulk_action_delete and delete_single_image_call AJAX actions in all versions up to, and including, 3.0.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary attachments. A nonce check was added in version 3.0.1, however, it wasn't until version 3.0.2 that a capability check was added.
History

Thu, 26 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Media Hygiene
Media Hygiene media Hygiene
CPEs cpe:2.3:a:media_hygiene:media_hygiene:*:*:*:*:*:*:*:*
Vendors & Products Media Hygiene
Media Hygiene media Hygiene
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-07-09T02:03:10.458Z

Updated: 2024-08-01T21:25:02.956Z

Reserved: 2024-06-11T12:52:40.797Z

Link: CVE-2024-5855

cve-icon Vulnrichment

Updated: 2024-08-01T21:25:02.956Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-07-09T02:15:10.437

Modified: 2024-11-21T09:48:28.953

Link: CVE-2024-5855

cve-icon Redhat

No data.