CVE-2024-13338: CWE-352 Cross-Site Request Forgery (CSRF) in creativemotion Clearfy Cache – WordPress optimization plugin, Minify HTML, CSS & JS, Defer
The Clearfy Cache – WordPress optimization plugin, Minify HTML, CSS & JS, Defer plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.3.1. This is due to missing or incorrect nonce validation on the wclearfy_cache_delete functionality . This makes it possible for unauthenticated attackers to clear the cache via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI Analysis
Technical Summary
CVE-2024-13338 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the Clearfy Cache – WordPress optimization plugin, which provides functionality such as minifying HTML, CSS, and JavaScript, as well as deferring script loading to improve website performance. This vulnerability exists in all versions up to and including 2.3.1. The root cause is the absence or incorrect implementation of nonce validation on the 'wclearfy_cache_delete' functionality. Nonces are security tokens used to verify that a request comes from a legitimate source and to prevent unauthorized actions. Without proper nonce validation, an attacker can craft a malicious request that, when executed by an authenticated site administrator (e.g., by clicking a link or visiting a malicious webpage), triggers the cache clearing operation without the administrator's explicit consent. This attack does not require the attacker to be authenticated or to have any privileges on the target WordPress site. The vulnerability impacts the integrity of the website's caching mechanism by allowing unauthorized cache clearing, which could degrade website performance or cause temporary service disruption. The CVSS v3.1 base score is 5.3 (medium severity), reflecting that the attack vector is network-based, requires no privileges or user interaction from the attacker, and impacts integrity but not confidentiality or availability. No known exploits are currently reported in the wild, and no patches or updates have been linked yet. The vulnerability is classified under CWE-352, which corresponds to CSRF attacks.
Potential Impact
For European organizations using WordPress websites with the Clearfy Cache plugin, this vulnerability could lead to unauthorized cache clearing by attackers who trick site administrators into performing unintended actions. While this does not directly compromise sensitive data confidentiality or availability, it can degrade website performance, increase server load, and potentially disrupt user experience temporarily. In sectors where website uptime and performance are critical—such as e-commerce, government portals, and financial services—this could translate into reputational damage and loss of customer trust. Additionally, frequent cache clearing might expose the site to further attacks by increasing the load on backend systems or revealing unminified source code temporarily. Since WordPress is widely used across Europe, and caching plugins are common for performance optimization, the impact could be widespread, especially for organizations that do not have strict administrative security policies or awareness training to prevent social engineering attacks that facilitate CSRF.
Mitigation Recommendations
1. Immediate mitigation involves updating the Clearfy Cache plugin to a version that properly implements nonce validation on the 'wclearfy_cache_delete' action once the vendor releases a patch. 2. Until a patch is available, administrators should restrict access to the WordPress admin dashboard to trusted IP addresses or VPNs to reduce exposure. 3. Implement Content Security Policy (CSP) headers to limit the domains from which scripts and forms can be submitted, reducing the risk of CSRF. 4. Educate site administrators about the risks of clicking on suspicious links or visiting untrusted websites while logged into the WordPress admin panel. 5. Use security plugins that provide additional CSRF protections or monitor for unusual cache clearing activities. 6. Regularly back up website data and configurations to quickly restore service if performance degradation or other issues arise. 7. Monitor web server and application logs for unexpected cache clearing requests or patterns that may indicate exploitation attempts.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2024-13338: CWE-352 Cross-Site Request Forgery (CSRF) in creativemotion Clearfy Cache – WordPress optimization plugin, Minify HTML, CSS & JS, Defer
Description
The Clearfy Cache – WordPress optimization plugin, Minify HTML, CSS & JS, Defer plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.3.1. This is due to missing or incorrect nonce validation on the wclearfy_cache_delete functionality . This makes it possible for unauthenticated attackers to clear the cache via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI-Powered Analysis
Technical Analysis
CVE-2024-13338 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the Clearfy Cache – WordPress optimization plugin, which provides functionality such as minifying HTML, CSS, and JavaScript, as well as deferring script loading to improve website performance. This vulnerability exists in all versions up to and including 2.3.1. The root cause is the absence or incorrect implementation of nonce validation on the 'wclearfy_cache_delete' functionality. Nonces are security tokens used to verify that a request comes from a legitimate source and to prevent unauthorized actions. Without proper nonce validation, an attacker can craft a malicious request that, when executed by an authenticated site administrator (e.g., by clicking a link or visiting a malicious webpage), triggers the cache clearing operation without the administrator's explicit consent. This attack does not require the attacker to be authenticated or to have any privileges on the target WordPress site. The vulnerability impacts the integrity of the website's caching mechanism by allowing unauthorized cache clearing, which could degrade website performance or cause temporary service disruption. The CVSS v3.1 base score is 5.3 (medium severity), reflecting that the attack vector is network-based, requires no privileges or user interaction from the attacker, and impacts integrity but not confidentiality or availability. No known exploits are currently reported in the wild, and no patches or updates have been linked yet. The vulnerability is classified under CWE-352, which corresponds to CSRF attacks.
Potential Impact
For European organizations using WordPress websites with the Clearfy Cache plugin, this vulnerability could lead to unauthorized cache clearing by attackers who trick site administrators into performing unintended actions. While this does not directly compromise sensitive data confidentiality or availability, it can degrade website performance, increase server load, and potentially disrupt user experience temporarily. In sectors where website uptime and performance are critical—such as e-commerce, government portals, and financial services—this could translate into reputational damage and loss of customer trust. Additionally, frequent cache clearing might expose the site to further attacks by increasing the load on backend systems or revealing unminified source code temporarily. Since WordPress is widely used across Europe, and caching plugins are common for performance optimization, the impact could be widespread, especially for organizations that do not have strict administrative security policies or awareness training to prevent social engineering attacks that facilitate CSRF.
Mitigation Recommendations
1. Immediate mitigation involves updating the Clearfy Cache plugin to a version that properly implements nonce validation on the 'wclearfy_cache_delete' action once the vendor releases a patch. 2. Until a patch is available, administrators should restrict access to the WordPress admin dashboard to trusted IP addresses or VPNs to reduce exposure. 3. Implement Content Security Policy (CSP) headers to limit the domains from which scripts and forms can be submitted, reducing the risk of CSRF. 4. Educate site administrators about the risks of clicking on suspicious links or visiting untrusted websites while logged into the WordPress admin panel. 5. Use security plugins that provide additional CSRF protections or monitor for unusual cache clearing activities. 6. Regularly back up website data and configurations to quickly restore service if performance degradation or other issues arise. 7. Monitor web server and application logs for unexpected cache clearing requests or patterns that may indicate exploitation attempts.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-10T18:37:38.068Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9816c4522896dcbd6bfb
Added to database: 5/21/2025, 9:08:38 AM
Last enriched: 7/4/2025, 9:43:23 PM
Last updated: 8/14/2025, 7:25:25 AM
Views: 14
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.