The WP-Optimize WordPress plugin before 4.2.0 does not properly escape user input when checking image compression statuses, which could allow users with the administrator role to conduct SQL Injection attacks in the context of Multi-Site WordPress configurations.
Metrics
Affected Vendors & Products
References
History
Mon, 09 Jun 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Updraftplus
Updraftplus wp-optimize |
|
Weaknesses | CWE-89 | |
CPEs | cpe:2.3:a:updraftplus:wp-optimize:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Updraftplus
Updraftplus wp-optimize |
Mon, 02 Jun 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 02 Jun 2025 17:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
cvssV3_1
|
Mon, 02 Jun 2025 06:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The WP-Optimize WordPress plugin before 4.2.0 does not properly escape user input when checking image compression statuses, which could allow users with the administrator role to conduct SQL Injection attacks in the context of Multi-Site WordPress configurations. | |
Title | WP-Optimize < 4.2.0 - Admin+ SQLi | |
References |
|

Status: PUBLISHED
Assigner: WPScan
Published: 2025-06-02T06:00:18.686Z
Updated: 2025-06-02T16:53:55.983Z
Reserved: 2025-04-25T18:55:14.981Z
Link: CVE-2025-3951

Updated: 2025-06-02T16:53:48.322Z

Status : Analyzed
Published: 2025-06-02T06:15:20.620
Modified: 2025-06-09T20:54:55.080
Link: CVE-2025-3951

No data.