
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability CVE-2021-25116 affects the WordPress plugin Enqueue Anything versions 1.0.1 and below. This security flaw was publicly disclosed on May 17, 2022, and involves missing authorization and CSRF checks in the remove_asset AJAX action functionality (WPScan).
The vulnerability stems from the absence of proper authorization and CSRF (Cross-Site Request Forgery) checks in the remove_asset AJAX action. Additionally, the plugin failed to verify whether the item targeted for deletion was actually an asset. While version 1.0.1 implemented a check to verify if the post to be removed is an asset, the plugin still lacks crucial capability and CSRF checks. The vulnerability has been assigned a CVSS score of 5.4 (medium severity) and is classified under CWE-862 (Missing Authorization) (WPScan).
The vulnerability allows low-privilege users, such as subscribers, to delete arbitrary assets and move arbitrary posts to the trash, potentially leading to unauthorized content manipulation and deletion (WPScan).
As of the last update, there is no known fix available for this vulnerability. While version 1.0.1 partially addressed the issue by adding a check to ensure the post to be removed is an asset, the plugin still lacks necessary capability and CSRF checks (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."