Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1246: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in shortpixel ShortPixel Image Optimizer – Optimize Images, Convert WebP & AVIF

0
Medium
VulnerabilityCVE-2026-1246cvecve-2026-1246cwe-22
Published: Thu Feb 05 2026 (02/05/2026, 06:47:41 UTC)
Source: CVE Database V5
Vendor/Project: shortpixel
Product: ShortPixel Image Optimizer – Optimize Images, Convert WebP & AVIF

Description

The ShortPixel Image Optimizer plugin for WordPress is vulnerable to Arbitrary File Read via path traversal in the 'loadFile' parameter in all versions up to, and including, 6.4.2 due to insufficient path validation and sanitization in the 'loadLogFile' AJAX action. This makes it possible for authenticated attackers, with Editor-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information such as database credentials and authentication keys.

AI-Powered Analysis

AILast updated: 02/05/2026, 07:14:45 UTC

Technical Analysis

CVE-2026-1246 is a path traversal vulnerability categorized under CWE-22 found in the ShortPixel Image Optimizer plugin for WordPress, which is widely used for image optimization and conversion to WebP and AVIF formats. The vulnerability exists in the 'loadLogFile' AJAX action, specifically in the handling of the 'loadFile' parameter. Due to insufficient validation and sanitization of this parameter, an authenticated attacker with Editor-level access or higher can manipulate the path input to traverse directories outside the intended restricted directory. This allows arbitrary file read on the server, potentially exposing sensitive files such as configuration files containing database credentials, authentication keys, or other sensitive data. The vulnerability affects all versions up to and including 6.4.2. Exploitation does not require user interaction but does require elevated privileges (Editor or above), limiting the attack surface to users with some level of trust on the WordPress site. The CVSS 3.1 base score is 4.9 (medium severity), reflecting the moderate impact and the requirement for authentication. No patches or fixes are currently linked, and no known exploits have been observed in the wild. The vulnerability highlights the importance of proper input validation and access control in WordPress plugins, especially those handling file system operations.

Potential Impact

For European organizations, this vulnerability poses a risk of sensitive data exposure if the ShortPixel Image Optimizer plugin is deployed on their WordPress sites. Attackers with Editor-level access could read critical files, potentially leading to further compromise such as credential theft, lateral movement, or privilege escalation. This is particularly concerning for organizations with multiple content editors or contributors, increasing the likelihood of insider threats or compromised accounts. Exposure of database credentials or authentication keys could lead to data breaches or unauthorized access to backend systems. Although the vulnerability does not allow code execution or denial of service, the confidentiality impact is high. Organizations in sectors with strict data protection regulations, such as finance, healthcare, and government, could face compliance and reputational risks if exploited. The medium CVSS score reflects the balance between the requirement for authentication and the high confidentiality impact.

Mitigation Recommendations

1. Immediately restrict Editor-level and higher access to trusted users only, minimizing the risk of malicious exploitation. 2. Monitor and audit user accounts with Editor or Administrator privileges for suspicious activity or unauthorized access. 3. Implement strict file system permissions on the server to limit the exposure of sensitive files even if arbitrary file read is attempted. 4. Disable or remove the ShortPixel Image Optimizer plugin if it is not essential, or replace it with alternative plugins that have no known vulnerabilities. 5. Regularly check for updates from the vendor and apply patches promptly once available. 6. Employ Web Application Firewalls (WAF) with rules to detect and block path traversal attempts targeting the 'loadLogFile' AJAX action. 7. Conduct regular security assessments and penetration testing focused on WordPress plugins and their access controls. 8. Educate site administrators and editors about the risks of privilege misuse and the importance of strong authentication practices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-20T18:53:28.652Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69843ff8f9fa50a62f08b1ec

Added to database: 2/5/2026, 7:00:08 AM

Last enriched: 2/5/2026, 7:14:45 AM

Last updated: 2/5/2026, 8:04:09 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats