Skip to main content

CVE-2025-6626: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in shortpixel ShortPixel Adaptive Images – WebP, AVIF, CDN, Image Optimization

Medium
VulnerabilityCVE-2025-6626cvecve-2025-6626cwe-79
Published: Sat Aug 02 2025 (08/02/2025, 07:24:21 UTC)
Source: CVE Database V5
Vendor/Project: shortpixel
Product: ShortPixel Adaptive Images – WebP, AVIF, CDN, Image Optimization

Description

The ShortPixel Adaptive Images – WebP, AVIF, CDN, Image Optimization plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the API URL Setting in all versions up to, and including, 3.10.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.

AI-Powered Analysis

AILast updated: 08/10/2025, 00:58:38 UTC

Technical Analysis

CVE-2025-6626 is a medium-severity stored Cross-Site Scripting (XSS) vulnerability affecting the ShortPixel Adaptive Images – WebP, AVIF, CDN, Image Optimization plugin for WordPress, specifically versions up to and including 3.10.3. This vulnerability arises from improper neutralization of input during web page generation (CWE-79), where insufficient input sanitization and output escaping occur in the API URL Setting. The flaw allows authenticated attackers with administrator-level privileges to inject arbitrary malicious scripts into pages. These scripts execute in the context of users who access the compromised pages, potentially leading to session hijacking, privilege escalation, or other malicious actions. Notably, this vulnerability only impacts multi-site WordPress installations or installations where the unfiltered_html capability is disabled, limiting the attack surface. The CVSS 3.1 base score is 4.4, reflecting a network attack vector with high attack complexity and requiring high privileges but no user interaction. The scope is changed, indicating that the vulnerability can affect components beyond the initially vulnerable plugin. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability was publicly disclosed in August 2025, with the initial reservation in June 2025. The plugin is widely used for image optimization and delivery in WordPress environments, making this vulnerability relevant for websites relying on ShortPixel's adaptive image services in multi-site configurations.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to WordPress multi-site deployments using the ShortPixel Adaptive Images plugin. Exploitation could allow an attacker with administrator access to inject malicious scripts, potentially compromising the confidentiality and integrity of user sessions and data. This could lead to unauthorized actions performed on behalf of users, data leakage, or defacement of websites. Given the requirement for administrator privileges, the threat is more about insider threats or compromised admin accounts rather than external attackers directly exploiting the vulnerability. However, in environments where administrator credentials are weak or have been phished, this vulnerability could be leveraged to escalate attacks. The impact on availability is minimal as the vulnerability does not enable denial of service. European organizations with multi-site WordPress installations, especially those in sectors like media, e-commerce, or government that rely on WordPress for content management and use ShortPixel for image optimization, should be particularly cautious. Additionally, the limitation to installations with unfiltered_html disabled means that some configurations may be more vulnerable than others. Overall, the vulnerability could facilitate targeted attacks that undermine trust and data security within affected organizations.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first verify if they operate multi-site WordPress installations using the ShortPixel Adaptive Images plugin version 3.10.3 or earlier. Immediate steps include: 1) Restrict administrator access strictly to trusted personnel and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 2) Monitor and audit administrator activities and plugin settings for suspicious changes, particularly in the API URL Setting. 3) Temporarily disable or restrict the use of the ShortPixel Adaptive Images plugin in multi-site environments until a security patch is released. 4) Implement Content Security Policy (CSP) headers to limit the execution of unauthorized scripts on web pages. 5) Regularly update WordPress core and plugins to the latest versions once the vendor releases a patch addressing this vulnerability. 6) Consider deploying Web Application Firewalls (WAFs) with custom rules to detect and block attempts to inject malicious scripts via the API URL Setting. 7) Educate administrators about the risks of XSS and the importance of sanitizing inputs when configuring plugins. These targeted actions go beyond generic advice by focusing on the specific conditions and configurations that enable exploitation of this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-06-25T10:26:36.435Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 688dbf27ad5a09ad00d1faf3

Added to database: 8/2/2025, 7:32:55 AM

Last enriched: 8/10/2025, 12:58:38 AM

Last updated: 9/15/2025, 9:41:57 AM

Views: 36

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats