CVE-2025-11378: CWE-862 Missing Authorization in shortpixel ShortPixel Image Optimizer – Optimize Images, Convert WebP & AVIF
The ShortPixel Image Optimizer – Optimize Images, Convert WebP & AVIF plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'shortpixel_ajaxRequest' AJAX action in all versions up to, and including, 6.3.4. This makes it possible for authenticated attackers, with Contributor-level access and above, to export and import site options.
AI Analysis
Technical Summary
The ShortPixel Image Optimizer plugin for WordPress, widely used for image optimization and conversion to WebP and AVIF formats, contains a vulnerability identified as CVE-2025-11378. This vulnerability is classified under CWE-862 (Missing Authorization) and affects all versions up to and including 6.3.4. The root cause is a missing capability check on the 'shortpixel_ajaxRequest' AJAX action, which is responsible for handling certain plugin operations. Because of this missing authorization, any authenticated user with at least Contributor-level privileges can exploit this flaw to export and import site options, effectively modifying site configurations without proper permission. The vulnerability does not require user interaction beyond authentication, and the attack vector is network-based (remote). The CVSS v3.1 score is 5.4 (medium), reflecting that the attack requires low complexity and privileges but impacts only confidentiality and integrity, not availability. No public exploits are known at this time, but the vulnerability poses a risk in environments where Contributor roles are assigned to users who should not have such capabilities. The plugin's widespread use in WordPress installations makes this a relevant concern for many websites, especially those with multiple contributors or less stringent role management policies.
Potential Impact
For European organizations, the vulnerability can lead to unauthorized modification of site options, potentially exposing sensitive configuration data or enabling further malicious changes to the website's behavior. This can undermine the integrity and confidentiality of the affected WordPress sites, possibly leading to data leakage or unauthorized site manipulation. Organizations relying on ShortPixel for image optimization may face reputational damage if attackers leverage this flaw to alter site content or configurations. The impact is particularly significant for entities with multiple contributors or external collaborators who have Contributor-level access, as these users could exploit the vulnerability to escalate their influence over the site. While availability is not directly affected, the indirect consequences of unauthorized configuration changes could disrupt normal operations or security postures. Given the widespread use of WordPress across Europe, especially in sectors like e-commerce, media, and public services, the vulnerability represents a moderate risk that requires timely mitigation.
Mitigation Recommendations
1. Monitor the ShortPixel plugin's official channels for a security patch addressing CVE-2025-11378 and apply updates immediately upon release. 2. Until a patch is available, restrict Contributor-level permissions by reviewing and tightening user roles and capabilities in WordPress, ensuring that only trusted users have such access. 3. Implement web application firewall (WAF) rules to detect and block suspicious AJAX requests targeting 'shortpixel_ajaxRequest' actions from unauthorized users. 4. Audit existing site options export/import logs and configurations for any unauthorized changes to detect potential exploitation. 5. Consider temporarily disabling the ShortPixel plugin if Contributor-level access cannot be sufficiently controlled or monitored. 6. Educate site administrators and contributors about the risk and encourage strong authentication practices to reduce the risk of compromised accounts. 7. Employ security plugins that can enforce granular capability checks and monitor AJAX actions for anomalous behavior.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-11378: CWE-862 Missing Authorization in shortpixel ShortPixel Image Optimizer – Optimize Images, Convert WebP & AVIF
Description
The ShortPixel Image Optimizer – Optimize Images, Convert WebP & AVIF plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'shortpixel_ajaxRequest' AJAX action in all versions up to, and including, 6.3.4. This makes it possible for authenticated attackers, with Contributor-level access and above, to export and import site options.
AI-Powered Analysis
Technical Analysis
The ShortPixel Image Optimizer plugin for WordPress, widely used for image optimization and conversion to WebP and AVIF formats, contains a vulnerability identified as CVE-2025-11378. This vulnerability is classified under CWE-862 (Missing Authorization) and affects all versions up to and including 6.3.4. The root cause is a missing capability check on the 'shortpixel_ajaxRequest' AJAX action, which is responsible for handling certain plugin operations. Because of this missing authorization, any authenticated user with at least Contributor-level privileges can exploit this flaw to export and import site options, effectively modifying site configurations without proper permission. The vulnerability does not require user interaction beyond authentication, and the attack vector is network-based (remote). The CVSS v3.1 score is 5.4 (medium), reflecting that the attack requires low complexity and privileges but impacts only confidentiality and integrity, not availability. No public exploits are known at this time, but the vulnerability poses a risk in environments where Contributor roles are assigned to users who should not have such capabilities. The plugin's widespread use in WordPress installations makes this a relevant concern for many websites, especially those with multiple contributors or less stringent role management policies.
Potential Impact
For European organizations, the vulnerability can lead to unauthorized modification of site options, potentially exposing sensitive configuration data or enabling further malicious changes to the website's behavior. This can undermine the integrity and confidentiality of the affected WordPress sites, possibly leading to data leakage or unauthorized site manipulation. Organizations relying on ShortPixel for image optimization may face reputational damage if attackers leverage this flaw to alter site content or configurations. The impact is particularly significant for entities with multiple contributors or external collaborators who have Contributor-level access, as these users could exploit the vulnerability to escalate their influence over the site. While availability is not directly affected, the indirect consequences of unauthorized configuration changes could disrupt normal operations or security postures. Given the widespread use of WordPress across Europe, especially in sectors like e-commerce, media, and public services, the vulnerability represents a moderate risk that requires timely mitigation.
Mitigation Recommendations
1. Monitor the ShortPixel plugin's official channels for a security patch addressing CVE-2025-11378 and apply updates immediately upon release. 2. Until a patch is available, restrict Contributor-level permissions by reviewing and tightening user roles and capabilities in WordPress, ensuring that only trusted users have such access. 3. Implement web application firewall (WAF) rules to detect and block suspicious AJAX requests targeting 'shortpixel_ajaxRequest' actions from unauthorized users. 4. Audit existing site options export/import logs and configurations for any unauthorized changes to detect potential exploitation. 5. Consider temporarily disabling the ShortPixel plugin if Contributor-level access cannot be sufficiently controlled or monitored. 6. Educate site administrators and contributors about the risk and encourage strong authentication practices to reduce the risk of compromised accounts. 7. Employ security plugins that can enforce granular capability checks and monitor AJAX actions for anomalous behavior.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-06T16:43:29.722Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68f30d8cba51437ed4aaca68
Added to database: 10/18/2025, 3:46:20 AM
Last enriched: 10/18/2025, 4:00:45 AM
Last updated: 10/19/2025, 2:19:47 PM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11940: Uncontrolled Search Path in LibreWolf
HighCVE-2025-11939: Path Traversal in ChurchCRM
MediumCVE-2025-11938: Deserialization in ChurchCRM
MediumAI Chat Data Is History's Most Thorough Record of Enterprise Secrets. Secure It Wisely
MediumAI Agent Security: Whose Responsibility Is It?
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.