Skip to main content

CVE-2025-6626: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in shortpixel ShortPixel Adaptive Images – WebP, AVIF, CDN, Image Optimization

Medium
VulnerabilityCVE-2025-6626cvecve-2025-6626cwe-79
Published: Sat Aug 02 2025 (08/02/2025, 07:24:21 UTC)
Source: CVE Database V5
Vendor/Project: shortpixel
Product: ShortPixel Adaptive Images – WebP, AVIF, CDN, Image Optimization

Description

The ShortPixel Adaptive Images – WebP, AVIF, CDN, Image Optimization plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the API URL Setting in all versions up to, and including, 3.10.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

AI-Powered Analysis

AILast updated: 08/02/2025, 07:48:29 UTC

Technical Analysis

CVE-2025-6626 is a medium-severity stored Cross-Site Scripting (XSS) vulnerability affecting the ShortPixel Adaptive Images – WebP, AVIF, CDN, Image Optimization plugin for WordPress, specifically versions up to and including 3.10.3. The vulnerability arises from improper neutralization of input during web page generation (CWE-79), where insufficient input sanitization and output escaping occur on the API URL Setting. This flaw allows authenticated attackers with administrator-level privileges to inject arbitrary malicious scripts into pages. These scripts execute whenever any user accesses the compromised page, potentially leading to session hijacking, defacement, or other malicious activities. The vulnerability is limited to multi-site WordPress installations or those where the unfiltered_html capability is disabled, which restricts the scope somewhat. The CVSS v3.1 base score is 4.4, reflecting a medium severity with network attack vector, high attack complexity, high privileges required, no user interaction, and a scope change. The impact affects confidentiality and integrity but not availability. No known exploits are currently reported in the wild, and no patches have been linked yet. This vulnerability is particularly relevant for organizations using WordPress multisite environments with this plugin installed, as it could be leveraged by malicious insiders or compromised administrators to inject persistent malicious code affecting multiple users or sites within the network.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on WordPress multisite setups with the ShortPixel Adaptive Images plugin for image optimization. Exploitation could lead to unauthorized script execution, enabling attackers to steal sensitive session cookies, perform actions on behalf of users, or manipulate site content. This can result in data breaches, reputational damage, and loss of user trust. Since the vulnerability requires administrator-level access, the threat is more internal or targeted, but the consequences remain serious if an attacker gains such privileges. The multi-site context amplifies the risk by potentially affecting multiple sites or users simultaneously. Additionally, organizations subject to GDPR must consider the regulatory implications of any data compromise resulting from such an attack. The medium CVSS score indicates moderate risk, but the potential for scope change and persistent XSS makes it a concern for web-facing services and portals.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should: 1) Immediately review and restrict administrator access to trusted personnel only, implementing strict access controls and monitoring for suspicious activity. 2) Disable or avoid using the ShortPixel Adaptive Images plugin on multi-site WordPress installations until a patch is available. 3) If the plugin is necessary, consider isolating it from critical sites or limiting its usage to single-site installations where the vulnerability does not apply. 4) Implement Web Application Firewall (WAF) rules to detect and block suspicious payloads targeting the API URL Setting. 5) Enable Content Security Policy (CSP) headers to reduce the impact of injected scripts. 6) Regularly audit and sanitize all inputs and outputs related to plugin settings, and monitor logs for unusual administrator actions. 7) Stay updated with vendor advisories and apply patches promptly once released. 8) Educate administrators about the risks of XSS and the importance of secure plugin management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-06-25T10:26:36.435Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 688dbf27ad5a09ad00d1faf3

Added to database: 8/2/2025, 7:32:55 AM

Last enriched: 8/2/2025, 7:48:29 AM

Last updated: 8/2/2025, 9:16:25 AM

Views: 3

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats