Description
Missing Authorization vulnerability in opicron Image Cleanup image-cleanup allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Image Cleanup: from n/a through <= 1.9.2.
Published: 2025-12-09
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

A missing authorization check in the opicron Image Cleanup WordPress plugin up to version 1.9.2 allows an attacker to bypass normal access restrictions. This incomplete access control can enable an attacker to delete or otherwise manipulate media library items without permission, compromising the integrity and availability of the site’s content. The weakness is identified as a broken authentication/authorization flaw.

Affected Systems

WordPress users who have installed opicron’s Image Cleanup plugin version 1.9.2 or earlier are affected. The vulnerability exists in all releases of the plugin from the earliest available version through 1.9.2.

Risk and Exploitability

The CVSS score of 4.3 places this issue in the low‑severity range, and the EPSS score of below 1% suggests a very low probability of exploitation in the wild. It is not listed in the CISA KEV catalog. The likely attack vector is via the WordPress web application where the vulnerable plugin endpoint can be accessed without proper permission checks, allowing local or remote attackers to delete images when they have sufficient access to the site.

Generated by OpenCVE AI on April 29, 2026 at 13:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Image Cleanup plugin to a version newer than 1.9.2. This is the recommended vendor‑issued fix.
  • Restrict all plugin management pages to users with the administrator role and verify that no unauthorized roles have access.
  • Keep the WordPress core and all other plugins up to date, and run regular security scans to detect any misconfigurations or additional vulnerabilities.

Generated by OpenCVE AI on April 29, 2026 at 13:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Wed, 10 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 10 Dec 2025 18:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Tue, 09 Dec 2025 15:00:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in opicron Image Cleanup image-cleanup allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Image Cleanup: from n/a through <= 1.9.2.
Title WordPress Image Cleanup plugin <= 1.9.2 - Broken Access Control vulnerability
Weaknesses CWE-862
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T18:55:12.422Z

Reserved: 2025-10-21T14:59:44.293Z

Link: CVE-2025-62736

cve-icon Vulnrichment

Updated: 2025-12-10T21:53:09.195Z

cve-icon NVD

Status : Deferred

Published: 2025-12-09T16:18:02.357

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-62736

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T13:45:12Z

Weaknesses