Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-2109: CWE-918 Server-Side Request Forgery (SSRF) in smartersite WP Compress – Instant Performance & Speed Optimization

0
Medium
VulnerabilityCVE-2025-2109cvecve-2025-2109cwe-918
Published: Tue Mar 25 2025 (03/25/2025, 11:12:08 UTC)
Source: CVE Database V5
Vendor/Project: smartersite
Product: WP Compress – Instant Performance & Speed Optimization

Description

CVE-2025-2109 is a Server-Side Request Forgery (SSRF) vulnerability in the WP Compress – Instant Performance & Speed Optimization WordPress plugin affecting all versions up to 6. 30. 15. It allows unauthenticated attackers to make arbitrary web requests originating from the vulnerable web application via the init() function. This can be exploited to access internal services or sensitive information not normally accessible externally. The vulnerability has a CVSS score of 5. 8 (medium severity) with no authentication or user interaction required, and it impacts confidentiality but not integrity or availability. No known exploits are currently reported in the wild. Organizations using this plugin on WordPress sites should prioritize patching or mitigating this issue to prevent potential internal network reconnaissance or data exposure. Countries with high WordPress adoption and significant use of this plugin are at greater risk.

AI-Powered Analysis

AILast updated: 02/25/2026, 22:16:11 UTC

Technical Analysis

CVE-2025-2109 is a Server-Side Request Forgery (SSRF) vulnerability identified in the WP Compress – Instant Performance & Speed Optimization plugin for WordPress, maintained by smartersite. The vulnerability exists in all versions up to and including 6.30.15 and is triggered via the plugin's init() function. SSRF vulnerabilities allow an attacker to abuse the server's ability to make HTTP requests, causing it to send requests to arbitrary destinations chosen by the attacker. In this case, unauthenticated attackers can exploit the flaw without needing any credentials or user interaction. By leveraging this SSRF, attackers can potentially access internal services behind firewalls, query metadata services, or interact with other internal network resources that are otherwise inaccessible externally. The vulnerability impacts confidentiality by exposing internal information but does not affect data integrity or availability. The CVSS v3.1 base score is 5.8, reflecting a medium severity level due to the ease of exploitation (network accessible, no privileges or user interaction required) but limited impact scope. No public exploits or active exploitation campaigns have been reported to date. The lack of an official patch at the time of reporting means organizations must rely on mitigations until an update is released. Given WordPress's widespread use and the popularity of performance optimization plugins, this vulnerability poses a notable risk to websites using this plugin, especially those hosted in environments with sensitive internal services.

Potential Impact

The primary impact of this SSRF vulnerability is unauthorized internal network reconnaissance and potential information disclosure. Attackers can use the vulnerable WordPress plugin to send crafted requests from the web server to internal systems, which may include databases, internal APIs, cloud metadata services, or other protected resources. This can lead to leakage of sensitive data such as configuration details, credentials, or internal IP addresses. While the vulnerability does not directly allow code execution or data modification, the information gained can facilitate further attacks, including lateral movement or privilege escalation. Organizations relying on this plugin expose themselves to risks of data breaches and network mapping by external attackers. The vulnerability affects all installations of the plugin up to version 6.30.15, which could be widespread given the plugin’s function in performance optimization. The medium CVSS score reflects moderate risk, but the ease of exploitation and unauthenticated access increase the urgency for mitigation. The absence of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits once details are public.

Mitigation Recommendations

Until an official patch is released, organizations should implement specific mitigations to reduce risk. First, restrict outbound HTTP requests from the web server hosting the WordPress site to only trusted destinations using firewall rules or web application firewalls (WAFs). This limits the ability of SSRF attacks to reach internal services. Second, monitor and log outbound requests from the server for unusual or unexpected destinations to detect potential exploitation attempts. Third, consider disabling or removing the WP Compress plugin if it is not essential, or replace it with alternative performance optimization tools that do not have this vulnerability. Fourth, apply the principle of least privilege to internal services, ensuring they do not trust requests originating from the web server without proper authentication. Finally, once a patch is available from the vendor, prioritize updating the plugin to the fixed version to fully remediate the vulnerability. Regularly review and update WordPress plugins to minimize exposure to known vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-03-07T21:15:53.865Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b1fb7ef31ef0b54e522

Added to database: 2/25/2026, 9:35:27 PM

Last enriched: 2/25/2026, 10:16:11 PM

Last updated: 2/26/2026, 6:11:28 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats