Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11378: CWE-862 Missing Authorization in shortpixel ShortPixel Image Optimizer – Optimize Images, Convert WebP & AVIF

0
Medium
VulnerabilityCVE-2025-11378cvecve-2025-11378cwe-862
Published: Sat Oct 18 2025 (10/18/2025, 03:33:23 UTC)
Source: CVE Database V5
Vendor/Project: shortpixel
Product: ShortPixel Image Optimizer – Optimize Images, Convert WebP & AVIF

Description

The ShortPixel Image Optimizer – Optimize Images, Convert WebP & AVIF plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'shortpixel_ajaxRequest' AJAX action in all versions up to, and including, 6.3.4. This makes it possible for authenticated attackers, with Contributor-level access and above, to export and import site options.

AI-Powered Analysis

AILast updated: 10/18/2025, 04:00:45 UTC

Technical Analysis

The ShortPixel Image Optimizer plugin for WordPress, widely used for image optimization and conversion to WebP and AVIF formats, contains a vulnerability identified as CVE-2025-11378. This vulnerability is classified under CWE-862 (Missing Authorization) and affects all versions up to and including 6.3.4. The root cause is a missing capability check on the 'shortpixel_ajaxRequest' AJAX action, which is responsible for handling certain plugin operations. Because of this missing authorization, any authenticated user with at least Contributor-level privileges can exploit this flaw to export and import site options, effectively modifying site configurations without proper permission. The vulnerability does not require user interaction beyond authentication, and the attack vector is network-based (remote). The CVSS v3.1 score is 5.4 (medium), reflecting that the attack requires low complexity and privileges but impacts only confidentiality and integrity, not availability. No public exploits are known at this time, but the vulnerability poses a risk in environments where Contributor roles are assigned to users who should not have such capabilities. The plugin's widespread use in WordPress installations makes this a relevant concern for many websites, especially those with multiple contributors or less stringent role management policies.

Potential Impact

For European organizations, the vulnerability can lead to unauthorized modification of site options, potentially exposing sensitive configuration data or enabling further malicious changes to the website's behavior. This can undermine the integrity and confidentiality of the affected WordPress sites, possibly leading to data leakage or unauthorized site manipulation. Organizations relying on ShortPixel for image optimization may face reputational damage if attackers leverage this flaw to alter site content or configurations. The impact is particularly significant for entities with multiple contributors or external collaborators who have Contributor-level access, as these users could exploit the vulnerability to escalate their influence over the site. While availability is not directly affected, the indirect consequences of unauthorized configuration changes could disrupt normal operations or security postures. Given the widespread use of WordPress across Europe, especially in sectors like e-commerce, media, and public services, the vulnerability represents a moderate risk that requires timely mitigation.

Mitigation Recommendations

1. Monitor the ShortPixel plugin's official channels for a security patch addressing CVE-2025-11378 and apply updates immediately upon release. 2. Until a patch is available, restrict Contributor-level permissions by reviewing and tightening user roles and capabilities in WordPress, ensuring that only trusted users have such access. 3. Implement web application firewall (WAF) rules to detect and block suspicious AJAX requests targeting 'shortpixel_ajaxRequest' actions from unauthorized users. 4. Audit existing site options export/import logs and configurations for any unauthorized changes to detect potential exploitation. 5. Consider temporarily disabling the ShortPixel plugin if Contributor-level access cannot be sufficiently controlled or monitored. 6. Educate site administrators and contributors about the risk and encourage strong authentication practices to reduce the risk of compromised accounts. 7. Employ security plugins that can enforce granular capability checks and monitor AJAX actions for anomalous behavior.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-10-06T16:43:29.722Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f30d8cba51437ed4aaca68

Added to database: 10/18/2025, 3:46:20 AM

Last enriched: 10/18/2025, 4:00:45 AM

Last updated: 10/19/2025, 2:19:47 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats