CVE-2024-5855: CWE-862 Missing Authorization in slui Media Hygiene: Remove or Delete Unused Images and More!
CVE-2024-5855 is a medium severity vulnerability in the WordPress plugin 'Media Hygiene: Remove or Delete Unused Images and More! ' that allows authenticated users with Subscriber-level access or higher to delete arbitrary attachments without proper authorization. The flaw arises from missing capability checks on AJAX actions responsible for bulk and single image deletions in all versions up to 3. 0. 1. Although a nonce check was introduced in version 3. 0. 1, a proper capability check was only added in version 3. 0. 2, meaning earlier versions remain vulnerable.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2024-5855 affects the WordPress plugin 'Media Hygiene: Remove or Delete Unused Images and More!' in all versions up to and including 3.0.1. The root cause is a missing authorization check (CWE-862) on two AJAX actions: bulk_action_delete and delete_single_image_call. These actions handle deletion of media attachments but do not verify if the authenticated user has the necessary permissions to perform these deletions. As a result, any authenticated user with Subscriber-level access or above can invoke these AJAX endpoints to delete arbitrary attachments, leading to unauthorized data loss. While version 3.0.1 introduced a nonce check to prevent CSRF, it did not implement a capability check, which was only added in version 3.0.2. The vulnerability has a CVSS 3.1 base score of 4.3, reflecting a medium severity primarily due to its limited impact on availability and the requirement for authenticated access. There are no reports of active exploitation in the wild. The vulnerability impacts the integrity and availability of media content within affected WordPress sites, potentially disrupting website operations or content management.
Potential Impact
This vulnerability can lead to unauthorized deletion of media attachments on WordPress sites using the affected plugin versions. For organizations, this means potential loss of important images or media files, which can disrupt website content, degrade user experience, and require time-consuming recovery efforts. Although it does not directly impact confidentiality or allow remote code execution, the loss of media assets can affect brand reputation and operational continuity, especially for content-heavy websites such as e-commerce, news, or portfolio sites. Since exploitation requires only Subscriber-level authentication, attackers could leverage compromised or low-privilege accounts to cause damage. The scope is limited to sites running the vulnerable plugin versions, but given WordPress's widespread use, the overall impact can be significant. No known exploits in the wild reduce immediate risk, but the vulnerability remains a concern until patched.
Mitigation Recommendations
The primary mitigation is to upgrade the 'Media Hygiene: Remove or Delete Unused Images and More!' plugin to version 3.0.2 or later, where the missing capability checks have been implemented. Until upgrading is possible, site administrators should restrict user roles carefully, minimizing Subscriber-level accounts and monitoring for suspicious activity. Implementing strong authentication controls, such as multi-factor authentication, can reduce the risk of account compromise. Additionally, regular backups of media files and the WordPress database will facilitate recovery in case of unauthorized deletions. Site owners should also audit installed plugins regularly to identify and patch vulnerabilities promptly. Monitoring AJAX request logs for unusual deletion activity can help detect exploitation attempts. Finally, consider applying a Web Application Firewall (WAF) with custom rules to block unauthorized AJAX calls targeting these endpoints.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, India, Brazil, Japan, Netherlands
CVE-2024-5855: CWE-862 Missing Authorization in slui Media Hygiene: Remove or Delete Unused Images and More!
Description
CVE-2024-5855 is a medium severity vulnerability in the WordPress plugin 'Media Hygiene: Remove or Delete Unused Images and More! ' that allows authenticated users with Subscriber-level access or higher to delete arbitrary attachments without proper authorization. The flaw arises from missing capability checks on AJAX actions responsible for bulk and single image deletions in all versions up to 3. 0. 1. Although a nonce check was introduced in version 3. 0. 1, a proper capability check was only added in version 3. 0. 2, meaning earlier versions remain vulnerable.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2024-5855 affects the WordPress plugin 'Media Hygiene: Remove or Delete Unused Images and More!' in all versions up to and including 3.0.1. The root cause is a missing authorization check (CWE-862) on two AJAX actions: bulk_action_delete and delete_single_image_call. These actions handle deletion of media attachments but do not verify if the authenticated user has the necessary permissions to perform these deletions. As a result, any authenticated user with Subscriber-level access or above can invoke these AJAX endpoints to delete arbitrary attachments, leading to unauthorized data loss. While version 3.0.1 introduced a nonce check to prevent CSRF, it did not implement a capability check, which was only added in version 3.0.2. The vulnerability has a CVSS 3.1 base score of 4.3, reflecting a medium severity primarily due to its limited impact on availability and the requirement for authenticated access. There are no reports of active exploitation in the wild. The vulnerability impacts the integrity and availability of media content within affected WordPress sites, potentially disrupting website operations or content management.
Potential Impact
This vulnerability can lead to unauthorized deletion of media attachments on WordPress sites using the affected plugin versions. For organizations, this means potential loss of important images or media files, which can disrupt website content, degrade user experience, and require time-consuming recovery efforts. Although it does not directly impact confidentiality or allow remote code execution, the loss of media assets can affect brand reputation and operational continuity, especially for content-heavy websites such as e-commerce, news, or portfolio sites. Since exploitation requires only Subscriber-level authentication, attackers could leverage compromised or low-privilege accounts to cause damage. The scope is limited to sites running the vulnerable plugin versions, but given WordPress's widespread use, the overall impact can be significant. No known exploits in the wild reduce immediate risk, but the vulnerability remains a concern until patched.
Mitigation Recommendations
The primary mitigation is to upgrade the 'Media Hygiene: Remove or Delete Unused Images and More!' plugin to version 3.0.2 or later, where the missing capability checks have been implemented. Until upgrading is possible, site administrators should restrict user roles carefully, minimizing Subscriber-level accounts and monitoring for suspicious activity. Implementing strong authentication controls, such as multi-factor authentication, can reduce the risk of account compromise. Additionally, regular backups of media files and the WordPress database will facilitate recovery in case of unauthorized deletions. Site owners should also audit installed plugins regularly to identify and patch vulnerabilities promptly. Monitoring AJAX request logs for unusual deletion activity can help detect exploitation attempts. Finally, consider applying a Web Application Firewall (WAF) with custom rules to block unauthorized AJAX calls targeting these endpoints.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-06-11T12:52:40.797Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6bf3b7ef31ef0b55cfb0
Added to database: 2/25/2026, 9:38:59 PM
Last enriched: 2/26/2026, 2:51:26 AM
Last updated: 2/26/2026, 11:12:08 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64999: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Checkmk GmbH Checkmk
HighCVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.