Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14482: CWE-862 Missing Authorization in crushpics Crush.pics Image Optimizer – Image Compression and Optimization

0
Medium
VulnerabilityCVE-2025-14482cvecve-2025-14482cwe-862
Published: Wed Jan 14 2026 (01/14/2026, 05:28:09 UTC)
Source: CVE Database V5
Vendor/Project: crushpics
Product: Crush.pics Image Optimizer – Image Compression and Optimization

Description

The Crush.pics Image Optimizer - Image Compression and Optimization plugin for WordPress is vulnerable to unauthorized modification of data due to missing capability checks on multiple functions in all versions up to, and including, 1.8.7. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify plugin settings including disabling auto-compression and changing image quality settings.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 11:22:26 UTC

Technical Analysis

CVE-2025-14482 is a vulnerability identified in the Crush.pics Image Optimizer – Image Compression and Optimization plugin for WordPress, affecting all versions up to 1.8.7. The core issue is a missing authorization check (CWE-862) on multiple plugin functions, allowing authenticated users with Subscriber-level privileges or higher to modify plugin settings without proper capability verification. This flaw enables unauthorized modification of critical plugin configurations such as disabling automatic image compression and adjusting image quality parameters. Since WordPress Subscriber roles typically have limited permissions, this vulnerability expands their influence beyond intended boundaries, potentially undermining site optimization and performance. The vulnerability has a CVSS v3.1 base score of 4.3 (medium severity), with an attack vector of network (remote), low attack complexity, requiring privileges (low), no user interaction, and unchanged scope. There is no direct impact on confidentiality or availability, but the integrity of plugin settings is compromised. No known exploits have been reported in the wild, and no official patches have been released as of the publication date. The vulnerability was reserved in December 2025 and published in January 2026. The plugin is widely used in WordPress environments for image optimization, making this vulnerability relevant to many websites that rely on Crush.pics for media management.

Potential Impact

The primary impact of CVE-2025-14482 is the unauthorized modification of plugin settings by low-privilege authenticated users, which can degrade website image optimization effectiveness. This may lead to increased page load times, higher bandwidth usage, and a poorer user experience due to suboptimal image compression settings. While it does not directly expose sensitive data or cause service outages, the integrity of the website’s media optimization process is compromised. Attackers could disable auto-compression or reduce image quality, potentially affecting SEO rankings and user engagement. Organizations with multiple users having Subscriber or higher roles are at greater risk, especially if role assignments are not tightly controlled. The vulnerability could also be leveraged as part of a broader attack chain to weaken site performance or facilitate other malicious activities by degrading site reliability or user trust.

Mitigation Recommendations

To mitigate CVE-2025-14482, organizations should immediately audit user roles and permissions within their WordPress installations to ensure that only trusted users have Subscriber-level or higher access. Limit the number of users with such privileges and enforce the principle of least privilege. Monitor plugin settings regularly for unauthorized changes, particularly image compression and quality parameters. Until an official patch is released, consider temporarily disabling or replacing the Crush.pics plugin with alternative image optimization solutions that enforce proper authorization. Implement web application firewalls (WAFs) with rules to detect and block suspicious requests targeting plugin settings endpoints. Stay informed about updates from the plugin vendor and apply patches promptly once available. Additionally, consider employing WordPress security plugins that can enforce capability checks and alert on unauthorized configuration changes.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-10T19:10:58.805Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69672e008330e067168f3fd3

Added to database: 1/14/2026, 5:47:44 AM

Last enriched: 2/27/2026, 11:22:26 AM

Last updated: 3/23/2026, 8:08:43 PM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses