Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14482: CWE-862 Missing Authorization in crushpics Crush.pics Image Optimizer – Image Compression and Optimization

0
Medium
VulnerabilityCVE-2025-14482cvecve-2025-14482cwe-862
Published: Wed Jan 14 2026 (01/14/2026, 05:28:09 UTC)
Source: CVE Database V5
Vendor/Project: crushpics
Product: Crush.pics Image Optimizer – Image Compression and Optimization

Description

CVE-2025-14482 is a medium-severity vulnerability in the Crush. pics Image Optimizer WordPress plugin that allows authenticated users with Subscriber-level access or higher to modify plugin settings without proper authorization. This missing authorization (CWE-862) enables attackers to change image compression settings, potentially degrading image quality or disabling auto-compression. The vulnerability affects all versions up to and including 1. 8. 7. Exploitation does not require user interaction but does require at least low-level authenticated access. While it does not impact confidentiality or availability directly, it compromises the integrity of plugin settings. No known exploits are currently in the wild. European organizations using this plugin on WordPress sites should prioritize patching or restricting access to mitigate risk.

AI-Powered Analysis

AILast updated: 01/21/2026, 20:43:30 UTC

Technical Analysis

CVE-2025-14482 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Crush.pics Image Optimizer plugin for WordPress, which is widely used for image compression and optimization. The flaw exists because multiple functions within the plugin lack proper capability checks, allowing any authenticated user with Subscriber-level privileges or higher to modify critical plugin settings. These settings include disabling the auto-compression feature and altering image quality parameters, which can degrade the intended performance of the plugin and potentially affect website content presentation. The vulnerability affects all versions up to and including 1.8.7. The CVSS 3.1 base score is 4.3 (medium), reflecting that the attack vector is network-based, requires low privileges, no user interaction, and impacts integrity but not confidentiality or availability. The absence of proper authorization checks means that even low-privileged users can escalate their influence over the plugin’s behavior, which could be leveraged in multi-user WordPress environments to disrupt image optimization workflows or degrade user experience. No patches or exploit code are currently publicly available, and no known active exploitation has been reported. However, the vulnerability poses a risk to website integrity and operational consistency, especially for organizations relying on optimized images for performance and SEO.

Potential Impact

For European organizations, this vulnerability primarily threatens the integrity of website content management systems using the Crush.pics plugin. Altered image compression settings could lead to poorer image quality or increased page load times, negatively impacting user experience, brand reputation, and SEO rankings. While it does not directly expose sensitive data or cause service outages, the ability for low-privileged users to modify plugin settings could be exploited in insider threat scenarios or by attackers who have compromised low-level accounts. E-commerce, media, and marketing websites that rely heavily on optimized images for performance and customer engagement are particularly at risk. Additionally, organizations subject to strict content integrity and compliance requirements may face regulatory scrutiny if unauthorized changes go undetected. The vulnerability’s exploitation could also serve as a foothold for further attacks if combined with other vulnerabilities or misconfigurations.

Mitigation Recommendations

European organizations should immediately audit WordPress user roles and permissions to ensure that Subscriber-level accounts are tightly controlled and monitored. Restrict plugin management capabilities to trusted administrators only. Update the Crush.pics plugin to a version that addresses this vulnerability once available. In the absence of a patch, consider temporarily disabling the plugin or restricting access to its settings via custom code or security plugins that enforce capability checks. Implement monitoring and alerting for changes to plugin settings and image optimization parameters. Employ web application firewalls (WAFs) with rules targeting unauthorized modification attempts. Conduct regular security reviews of WordPress installations and enforce the principle of least privilege for all user accounts. Additionally, maintain backups of plugin configurations and website content to enable quick restoration if unauthorized changes occur.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-10T19:10:58.805Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69672e008330e067168f3fd3

Added to database: 1/14/2026, 5:47:44 AM

Last enriched: 1/21/2026, 8:43:30 PM

Last updated: 2/6/2026, 3:46:58 PM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats