Skip to main content

CVE-2024-13338: CWE-352 Cross-Site Request Forgery (CSRF) in creativemotion Clearfy Cache – WordPress optimization plugin, Minify HTML, CSS & JS, Defer

Medium
VulnerabilityCVE-2024-13338cvecve-2024-13338cwe-352
Published: Sat Apr 12 2025 (04/12/2025, 06:37:19 UTC)
Source: CVE
Vendor/Project: creativemotion
Product: Clearfy Cache – WordPress optimization plugin, Minify HTML, CSS & JS, Defer

Description

The Clearfy Cache – WordPress optimization plugin, Minify HTML, CSS & JS, Defer plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.3.1. This is due to missing or incorrect nonce validation on the wclearfy_cache_delete functionality . This makes it possible for unauthenticated attackers to clear the cache via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 07/04/2025, 21:43:23 UTC

Technical Analysis

CVE-2024-13338 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the Clearfy Cache – WordPress optimization plugin, which provides functionality such as minifying HTML, CSS, and JavaScript, as well as deferring script loading to improve website performance. This vulnerability exists in all versions up to and including 2.3.1. The root cause is the absence or incorrect implementation of nonce validation on the 'wclearfy_cache_delete' functionality. Nonces are security tokens used to verify that a request comes from a legitimate source and to prevent unauthorized actions. Without proper nonce validation, an attacker can craft a malicious request that, when executed by an authenticated site administrator (e.g., by clicking a link or visiting a malicious webpage), triggers the cache clearing operation without the administrator's explicit consent. This attack does not require the attacker to be authenticated or to have any privileges on the target WordPress site. The vulnerability impacts the integrity of the website's caching mechanism by allowing unauthorized cache clearing, which could degrade website performance or cause temporary service disruption. The CVSS v3.1 base score is 5.3 (medium severity), reflecting that the attack vector is network-based, requires no privileges or user interaction from the attacker, and impacts integrity but not confidentiality or availability. No known exploits are currently reported in the wild, and no patches or updates have been linked yet. The vulnerability is classified under CWE-352, which corresponds to CSRF attacks.

Potential Impact

For European organizations using WordPress websites with the Clearfy Cache plugin, this vulnerability could lead to unauthorized cache clearing by attackers who trick site administrators into performing unintended actions. While this does not directly compromise sensitive data confidentiality or availability, it can degrade website performance, increase server load, and potentially disrupt user experience temporarily. In sectors where website uptime and performance are critical—such as e-commerce, government portals, and financial services—this could translate into reputational damage and loss of customer trust. Additionally, frequent cache clearing might expose the site to further attacks by increasing the load on backend systems or revealing unminified source code temporarily. Since WordPress is widely used across Europe, and caching plugins are common for performance optimization, the impact could be widespread, especially for organizations that do not have strict administrative security policies or awareness training to prevent social engineering attacks that facilitate CSRF.

Mitigation Recommendations

1. Immediate mitigation involves updating the Clearfy Cache plugin to a version that properly implements nonce validation on the 'wclearfy_cache_delete' action once the vendor releases a patch. 2. Until a patch is available, administrators should restrict access to the WordPress admin dashboard to trusted IP addresses or VPNs to reduce exposure. 3. Implement Content Security Policy (CSP) headers to limit the domains from which scripts and forms can be submitted, reducing the risk of CSRF. 4. Educate site administrators about the risks of clicking on suspicious links or visiting untrusted websites while logged into the WordPress admin panel. 5. Use security plugins that provide additional CSRF protections or monitor for unusual cache clearing activities. 6. Regularly back up website data and configurations to quickly restore service if performance degradation or other issues arise. 7. Monitor web server and application logs for unexpected cache clearing requests or patterns that may indicate exploitation attempts.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-10T18:37:38.068Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9816c4522896dcbd6bfb

Added to database: 5/21/2025, 9:08:38 AM

Last enriched: 7/4/2025, 9:43:23 PM

Last updated: 8/14/2025, 7:25:25 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats