The WP-Optimize WordPress plugin before 4.2.0 does not properly escape user input when checking image compression statuses, which could allow users with the administrator role to conduct SQL Injection attacks in the context of Multi-Site WordPress configurations.
History

Mon, 09 Jun 2025 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Updraftplus
Updraftplus wp-optimize
Weaknesses CWE-89
CPEs cpe:2.3:a:updraftplus:wp-optimize:*:*:*:*:*:wordpress:*:*
Vendors & Products Updraftplus
Updraftplus wp-optimize

Mon, 02 Jun 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 02 Jun 2025 17:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:N/A:N'}


Mon, 02 Jun 2025 06:15:00 +0000

Type Values Removed Values Added
Description The WP-Optimize WordPress plugin before 4.2.0 does not properly escape user input when checking image compression statuses, which could allow users with the administrator role to conduct SQL Injection attacks in the context of Multi-Site WordPress configurations.
Title WP-Optimize < 4.2.0 - Admin+ SQLi
References

cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published: 2025-06-02T06:00:18.686Z

Updated: 2025-06-02T16:53:55.983Z

Reserved: 2025-04-25T18:55:14.981Z

Link: CVE-2025-3951

cve-icon Vulnrichment

Updated: 2025-06-02T16:53:48.322Z

cve-icon NVD

Status : Analyzed

Published: 2025-06-02T06:15:20.620

Modified: 2025-06-09T20:54:55.080

Link: CVE-2025-3951

cve-icon Redhat

No data.