2 results (0.004 seconds)

CVSS: 5.3EPSS: 0%CPEs: 1EXPL: 0

The Minify HTML plugin for WordPress is vulnerable to Regular Expression Denial of Service (ReDoS) in all versions up to, and including, 2.1.10. This is due to processing user-supplied input as a regular expression. This makes it possible for unauthenticated attackers to create comments that can cause catastrophic backtracking and break pages. • https://plugins.trac.wordpress.org/changeset/3203890/minify-html-markup https://www.wordfence.com/threat-intel/vulnerabilities/id/80334e81-c33d-464c-9409-f49c34681890?source=cve • CWE-400: Uncontrolled Resource Consumption •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

Cross-Site Request Forgery (CSRF) vulnerability in Tim Eckel Minify HTML plugin <= 2.1.7 vulnerability. The Minify HTML plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.1.7. This is due to missing or incorrect nonce validation on the minify_html_menu_options function. This makes it possible for unauthenticated attackers to modify the plugin's settings granted they can trick a site administrator into performing an action such as clicking on a link. • https://patchstack.com/database/vulnerability/minify-html-markup/wordpress-minify-html-plugin-2-02-cross-site-request-forgery-csrf-vulnerability?_s_id=cve • CWE-352: Cross-Site Request Forgery (CSRF) •