Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-46998 | The Media Hygiene: Remove or Delete Unused Images and More! plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the bulk_action_delete and delete_single_image_call AJAX actions in all versions up to, and including, 3.0.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary attachments. A nonce check was added in version 3.0.1, however, it wasn't until version 3.0.2 that a capability check was added. |
Wed, 08 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-862 |
Thu, 26 Feb 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Media Hygiene
Media Hygiene media Hygiene |
|
| CPEs | cpe:2.3:a:media_hygiene:media_hygiene:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Media Hygiene
Media Hygiene media Hygiene |
|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T16:49:25.682Z
Reserved: 2024-06-11T12:52:40.797Z
Link: CVE-2024-5855
Updated: 2024-08-01T21:25:02.956Z
Status : Deferred
Published: 2024-07-09T02:15:10.437
Modified: 2026-04-15T00:35:42.020
Link: CVE-2024-5855
No data.
OpenCVE Enrichment
Updated: 2025-07-12T15:42:24Z
EUVD