CVE-2025-6626: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in shortpixel ShortPixel Adaptive Images – WebP, AVIF, CDN, Image Optimization
The ShortPixel Adaptive Images – WebP, AVIF, CDN, Image Optimization plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the API URL Setting in all versions up to, and including, 3.10.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI Analysis
Technical Summary
CVE-2025-6626 is a medium-severity stored Cross-Site Scripting (XSS) vulnerability affecting the ShortPixel Adaptive Images – WebP, AVIF, CDN, Image Optimization plugin for WordPress, specifically versions up to and including 3.10.3. This vulnerability arises from improper neutralization of input during web page generation (CWE-79), where insufficient input sanitization and output escaping occur in the API URL Setting. The flaw allows authenticated attackers with administrator-level privileges to inject arbitrary malicious scripts into pages. These scripts execute in the context of users who access the compromised pages, potentially leading to session hijacking, privilege escalation, or other malicious actions. Notably, this vulnerability only impacts multi-site WordPress installations or installations where the unfiltered_html capability is disabled, limiting the attack surface. The CVSS 3.1 base score is 4.4, reflecting a network attack vector with high attack complexity and requiring high privileges but no user interaction. The scope is changed, indicating that the vulnerability can affect components beyond the initially vulnerable plugin. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was publicly disclosed in August 2025, with the initial reservation in June 2025. The plugin is widely used for image optimization and delivery in WordPress environments, making this vulnerability relevant for websites relying on ShortPixel's adaptive image services in multi-site configurations.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to WordPress multi-site deployments using the ShortPixel Adaptive Images plugin. Exploitation could allow an attacker with administrator access to inject malicious scripts, potentially compromising the confidentiality and integrity of user sessions and data. This could lead to unauthorized actions performed on behalf of users, data leakage, or defacement of websites. Given the requirement for administrator privileges, the threat is more about insider threats or compromised admin accounts rather than external attackers directly exploiting the vulnerability. However, in environments where administrator credentials are weak or have been phished, this vulnerability could be leveraged to escalate attacks. The impact on availability is minimal as the vulnerability does not enable denial of service. European organizations with multi-site WordPress installations, especially those in sectors like media, e-commerce, or government that rely on WordPress for content management and use ShortPixel for image optimization, should be particularly cautious. Additionally, the limitation to installations with unfiltered_html disabled means that some configurations may be more vulnerable than others. Overall, the vulnerability could facilitate targeted attacks that undermine trust and data security within affected organizations.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first verify if they operate multi-site WordPress installations using the ShortPixel Adaptive Images plugin version 3.10.3 or earlier. Immediate steps include: 1) Restrict administrator access strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 2) Monitor and audit administrator activities and plugin settings for suspicious changes, particularly in the API URL Setting. 3) Temporarily disable or restrict the use of the ShortPixel Adaptive Images plugin in multi-site environments until a security patch is released. 4) Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on web pages. 5) Regularly update WordPress core and plugins to the latest versions once the vendor releases a patch addressing this vulnerability. 6) Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block attempts to inject malicious scripts via the API URL Setting. 7) Educate administrators about the risks of XSS and the importance of sanitizing inputs when configuring plugins. These targeted actions go beyond generic advice by focusing on the specific conditions and configurations that enable exploitation of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-6626: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in shortpixel ShortPixel Adaptive Images – WebP, AVIF, CDN, Image Optimization
Description
The ShortPixel Adaptive Images – WebP, AVIF, CDN, Image Optimization plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the API URL Setting in all versions up to, and including, 3.10.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
AI-Powered Analysis
Technical Analysis
CVE-2025-6626 is a medium-severity stored Cross-Site Scripting (XSS) vulnerability affecting the ShortPixel Adaptive Images – WebP, AVIF, CDN, Image Optimization plugin for WordPress, specifically versions up to and including 3.10.3. This vulnerability arises from improper neutralization of input during web page generation (CWE-79), where insufficient input sanitization and output escaping occur in the API URL Setting. The flaw allows authenticated attackers with administrator-level privileges to inject arbitrary malicious scripts into pages. These scripts execute in the context of users who access the compromised pages, potentially leading to session hijacking, privilege escalation, or other malicious actions. Notably, this vulnerability only impacts multi-site WordPress installations or installations where the unfiltered_html capability is disabled, limiting the attack surface. The CVSS 3.1 base score is 4.4, reflecting a network attack vector with high attack complexity and requiring high privileges but no user interaction. The scope is changed, indicating that the vulnerability can affect components beyond the initially vulnerable plugin. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was publicly disclosed in August 2025, with the initial reservation in June 2025. The plugin is widely used for image optimization and delivery in WordPress environments, making this vulnerability relevant for websites relying on ShortPixel's adaptive image services in multi-site configurations.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to WordPress multi-site deployments using the ShortPixel Adaptive Images plugin. Exploitation could allow an attacker with administrator access to inject malicious scripts, potentially compromising the confidentiality and integrity of user sessions and data. This could lead to unauthorized actions performed on behalf of users, data leakage, or defacement of websites. Given the requirement for administrator privileges, the threat is more about insider threats or compromised admin accounts rather than external attackers directly exploiting the vulnerability. However, in environments where administrator credentials are weak or have been phished, this vulnerability could be leveraged to escalate attacks. The impact on availability is minimal as the vulnerability does not enable denial of service. European organizations with multi-site WordPress installations, especially those in sectors like media, e-commerce, or government that rely on WordPress for content management and use ShortPixel for image optimization, should be particularly cautious. Additionally, the limitation to installations with unfiltered_html disabled means that some configurations may be more vulnerable than others. Overall, the vulnerability could facilitate targeted attacks that undermine trust and data security within affected organizations.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first verify if they operate multi-site WordPress installations using the ShortPixel Adaptive Images plugin version 3.10.3 or earlier. Immediate steps include: 1) Restrict administrator access strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 2) Monitor and audit administrator activities and plugin settings for suspicious changes, particularly in the API URL Setting. 3) Temporarily disable or restrict the use of the ShortPixel Adaptive Images plugin in multi-site environments until a security patch is released. 4) Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on web pages. 5) Regularly update WordPress core and plugins to the latest versions once the vendor releases a patch addressing this vulnerability. 6) Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block attempts to inject malicious scripts via the API URL Setting. 7) Educate administrators about the risks of XSS and the importance of sanitizing inputs when configuring plugins. These targeted actions go beyond generic advice by focusing on the specific conditions and configurations that enable exploitation of this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-06-25T10:26:36.435Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 688dbf27ad5a09ad00d1faf3
Added to database: 8/2/2025, 7:32:55 AM
Last enriched: 8/10/2025, 12:58:38 AM
Last updated: 9/15/2025, 9:41:57 AM
Views: 36
Related Threats
CVE-2025-37125: Vulnerability in Hewlett Packard Enterprise (HPE) HPE Aruba Networking EdgeConnect SD-WAN Gateway
HighCVE-2025-37124: Vulnerability in Hewlett Packard Enterprise (HPE) HPE Aruba Networking EdgeConnect SD-WAN Gateway
HighCVE-2025-37123: Vulnerability in Hewlett Packard Enterprise (HPE) HPE Aruba Networking EdgeConnect SD-WAN Gateway
HighCVE-2025-43804: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Liferay Portal
MediumCVE-2025-37131: Vulnerability in Hewlett Packard Enterprise (HPE) HPE Aruba Networking EdgeConnect SD-WAN Gateway
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.