Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12190: CWE-352 Cross-Site Request Forgery (CSRF) in duddi Image Optimizer by wps.sk

0
Medium
VulnerabilityCVE-2025-12190cvecve-2025-12190cwe-352
Published: Fri Dec 05 2025 (12/05/2025, 05:31:28 UTC)
Source: CVE Database V5
Vendor/Project: duddi
Product: Image Optimizer by wps.sk

Description

The Image Optimizer by wps.sk plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.2.0. This is due to missing or incorrect nonce validation on the imagopby_ajax_optimize_gallery() function. This makes it possible for unauthenticated attackers to trigger bulk optimization via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

AI-Powered Analysis

AILast updated: 12/05/2025, 06:03:52 UTC

Technical Analysis

CVE-2025-12190 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the Image Optimizer plugin by wps.sk for WordPress, affecting all versions up to and including 1.2.0. The vulnerability stems from missing or incorrect nonce validation in the imagopby_ajax_optimize_gallery() function, which is responsible for handling bulk image optimization requests via AJAX. Nonces in WordPress are security tokens used to verify that a request comes from a legitimate source and prevent CSRF attacks. Because this validation is absent or flawed, an attacker can craft a malicious link or webpage that, when visited by a site administrator, triggers the bulk optimization process without their explicit consent. This attack vector does not require the attacker to be authenticated, but it does require the administrator to interact with the malicious content (e.g., clicking a link). The impact is limited to integrity, as unauthorized bulk optimization could lead to unintended changes in image files or excessive server resource consumption, potentially degrading site performance. Confidentiality and availability are not directly affected. The CVSS 3.1 base score is 4.3 (medium), reflecting the low complexity of attack but the requirement for user interaction and limited impact scope. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly. The plugin is used in WordPress environments, which are prevalent across many European organizations, especially in sectors relying on content management and e-commerce. The vulnerability highlights the importance of proper nonce implementation in AJAX handlers to prevent CSRF attacks in WordPress plugins.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized bulk image optimization operations on WordPress sites using the affected plugin. While it does not compromise sensitive data or cause downtime, it can degrade website performance by triggering resource-intensive processes without consent. This may result in slower page loads, increased server load, and potential disruption of user experience, which can indirectly affect business operations, especially for e-commerce or media-heavy sites. Attackers exploiting this vulnerability could also use it as part of a broader attack chain, leveraging the compromised site state for further malicious activities. Organizations with strict uptime and performance requirements may face reputational damage or operational inefficiencies. The requirement for administrator interaction means social engineering is a key risk factor, emphasizing the need for user awareness. Given the widespread use of WordPress in Europe, particularly in Germany, the UK, France, and the Netherlands, the potential impact is significant in these markets. However, the absence of known exploits in the wild reduces immediate risk but does not eliminate the need for proactive mitigation.

Mitigation Recommendations

1. Update the Image Optimizer by wps.sk plugin to a version that includes proper nonce validation once available. 2. If no patch exists, implement custom nonce verification in the imagopby_ajax_optimize_gallery() AJAX handler to ensure requests are legitimate. 3. Restrict access to the optimization functionality to trusted administrator roles only, possibly by limiting AJAX endpoint access via server or application-level controls. 4. Educate site administrators about the risks of clicking unsolicited links and the importance of verifying URLs before interaction to reduce social engineering risks. 5. Monitor server logs for unusual bulk optimization requests or spikes in resource usage that could indicate exploitation attempts. 6. Consider deploying Web Application Firewalls (WAFs) with rules to detect and block suspicious CSRF patterns targeting WordPress AJAX endpoints. 7. Regularly audit WordPress plugins for security best practices, especially nonce usage in AJAX calls, to prevent similar vulnerabilities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-24T20:04:51.655Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69327172f88dbe026c779928

Added to database: 12/5/2025, 5:45:22 AM

Last enriched: 12/5/2025, 6:03:52 AM

Last updated: 12/8/2025, 11:40:39 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats