Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-35172: Server-Side Request Forgery (SSRF) in ShortPixel ShortPixel Adaptive Images

0
Unknown
VulnerabilityCVE-2024-35172cvecve-2024-35172
Published: Mon May 13 2024 (05/13/2024, 08:38:57 UTC)
Source: CVE Database V5
Vendor/Project: ShortPixel
Product: ShortPixel Adaptive Images

Description

Server-Side Request Forgery (SSRF) vulnerability in ShortPixel ShortPixel Adaptive Images shortpixel-adaptive-images.This issue affects ShortPixel Adaptive Images: from n/a through <= 3.8.3.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 04:52:15 UTC

Technical Analysis

CVE-2024-35172 identifies a Server-Side Request Forgery (SSRF) vulnerability in the ShortPixel Adaptive Images WordPress plugin, specifically affecting all versions up to and including 3.8.3. SSRF vulnerabilities occur when an attacker can manipulate a server-side application to send HTTP requests to arbitrary domains or IP addresses, often enabling access to internal or protected network resources. In this case, the ShortPixel Adaptive Images plugin, which optimizes images on WordPress sites, improperly validates or restricts URLs or network requests it initiates, allowing an attacker to coerce the server into making unintended requests. This can lead to unauthorized internal network scanning, access to metadata services, or interaction with other internal services that are not exposed externally. The vulnerability does not require authentication, meaning any unauthenticated attacker can exploit it remotely. While no exploits have been reported in the wild yet, the nature of SSRF vulnerabilities makes them attractive for attackers aiming to pivot within networks or gather sensitive information. The lack of a CVSS score indicates that the vulnerability is newly disclosed and pending detailed scoring, but its characteristics suggest a significant risk. The plugin is widely used in WordPress environments globally, making the attack surface considerable. The absence of official patches or mitigation guidance in the provided data highlights the urgency for users to apply any forthcoming updates or implement network-level controls.

Potential Impact

The SSRF vulnerability in ShortPixel Adaptive Images can have severe consequences for organizations worldwide. Exploiting this flaw allows attackers to make arbitrary requests from the vulnerable server, potentially accessing internal services, cloud metadata endpoints, or other protected resources. This can lead to information disclosure, internal network reconnaissance, and potentially further exploitation such as lateral movement or privilege escalation. For websites relying on this plugin, especially those hosted in shared or cloud environments, the risk includes exposure of sensitive internal data and disruption of service integrity. The vulnerability could also be leveraged to bypass firewalls or network segmentation controls. Given that the plugin is used globally in WordPress sites, the scope of affected systems is broad, impacting organizations of all sizes that utilize this image optimization tool. The ease of exploitation without authentication further amplifies the threat, making it a critical concern for web administrators and security teams.

Mitigation Recommendations

To mitigate CVE-2024-35172, organizations should first monitor for and apply any official patches or updates released by ShortPixel as soon as they become available. In the absence of a patch, administrators should implement strict outbound network controls on the web server hosting the plugin, limiting the destinations to only trusted external services and blocking internal IP ranges to prevent SSRF exploitation. Web application firewalls (WAFs) should be configured to detect and block suspicious request patterns that could indicate SSRF attempts. Additionally, reviewing and restricting plugin permissions and capabilities within WordPress can reduce risk exposure. Logging and monitoring outbound HTTP requests from the server can help detect anomalous activity indicative of exploitation attempts. Organizations should also consider isolating the web server in a segmented network zone to minimize potential internal network exposure. Finally, educating web administrators about the risks of SSRF and the importance of timely patching is critical for effective defense.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2024-05-10T11:14:54.729Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd7437e6bfc5ba1def6517

Added to database: 4/1/2026, 7:38:31 PM

Last enriched: 4/2/2026, 4:52:15 AM

Last updated: 4/6/2026, 9:25:56 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses