Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5855: CWE-862 Missing Authorization in slui Media Hygiene: Remove or Delete Unused Images and More!

0
Medium
VulnerabilityCVE-2024-5855cvecve-2024-5855cwe-862
Published: Tue Jul 09 2024 (07/09/2024, 02:03:10 UTC)
Source: CVE Database V5
Vendor/Project: slui
Product: Media Hygiene: Remove or Delete Unused Images and More!

Description

CVE-2024-5855 is a medium severity vulnerability in the WordPress plugin 'Media Hygiene: Remove or Delete Unused Images and More! ' that allows authenticated users with Subscriber-level access or higher to delete arbitrary attachments without proper authorization. The flaw arises from missing capability checks on AJAX actions responsible for bulk and single image deletions in all versions up to 3. 0. 1. Although a nonce check was introduced in version 3. 0. 1, a proper capability check was only added in version 3. 0. 2, meaning earlier versions remain vulnerable.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:51:26 UTC

Technical Analysis

The vulnerability identified as CVE-2024-5855 affects the WordPress plugin 'Media Hygiene: Remove or Delete Unused Images and More!' in all versions up to and including 3.0.1. The root cause is a missing authorization check (CWE-862) on two AJAX actions: bulk_action_delete and delete_single_image_call. These actions handle deletion of media attachments but do not verify if the authenticated user has the necessary permissions to perform these deletions. As a result, any authenticated user with Subscriber-level access or above can invoke these AJAX endpoints to delete arbitrary attachments, leading to unauthorized data loss. While version 3.0.1 introduced a nonce check to prevent CSRF, it did not implement a capability check, which was only added in version 3.0.2. The vulnerability has a CVSS 3.1 base score of 4.3, reflecting a medium severity primarily due to its limited impact on availability and the requirement for authenticated access. There are no reports of active exploitation in the wild. The vulnerability impacts the integrity and availability of media content within affected WordPress sites, potentially disrupting website operations or content management.

Potential Impact

This vulnerability can lead to unauthorized deletion of media attachments on WordPress sites using the affected plugin versions. For organizations, this means potential loss of important images or media files, which can disrupt website content, degrade user experience, and require time-consuming recovery efforts. Although it does not directly impact confidentiality or allow remote code execution, the loss of media assets can affect brand reputation and operational continuity, especially for content-heavy websites such as e-commerce, news, or portfolio sites. Since exploitation requires only Subscriber-level authentication, attackers could leverage compromised or low-privilege accounts to cause damage. The scope is limited to sites running the vulnerable plugin versions, but given WordPress's widespread use, the overall impact can be significant. No known exploits in the wild reduce immediate risk, but the vulnerability remains a concern until patched.

Mitigation Recommendations

The primary mitigation is to upgrade the 'Media Hygiene: Remove or Delete Unused Images and More!' plugin to version 3.0.2 or later, where the missing capability checks have been implemented. Until upgrading is possible, site administrators should restrict user roles carefully, minimizing Subscriber-level accounts and monitoring for suspicious activity. Implementing strong authentication controls, such as multi-factor authentication, can reduce the risk of account compromise. Additionally, regular backups of media files and the WordPress database will facilitate recovery in case of unauthorized deletions. Site owners should also audit installed plugins regularly to identify and patch vulnerabilities promptly. Monitoring AJAX request logs for unusual deletion activity can help detect exploitation attempts. Finally, consider applying a Web Application Firewall (WAF) with custom rules to block unauthorized AJAX calls targeting these endpoints.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-06-11T12:52:40.797Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6bf3b7ef31ef0b55cfb0

Added to database: 2/25/2026, 9:38:59 PM

Last enriched: 2/26/2026, 2:51:26 AM

Last updated: 2/26/2026, 11:12:08 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats