We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-2110

WP Compress <= 6.30.15 - Authenticated (Subscriber+) Missing Authorization via Multiple Functions



Description

The WP Compress – Instant Performance & Speed Optimization plugin for WordPress is vulnerable to unauthorized access, modification, and loss of data due to missing capability checks on its on its AJAX functions in all versions up to, and including, 6.30.15. This makes it possible for authenticated attackers, with Subscriber-level access and above, to compromise the site in various ways depending on the specific function exploited - for example, by retrieving sensitive settings and configuration details, or by altering and deleting them, thereby disclosing sensitive information, disrupting the plugin’s functionality, and potentially impacting overall site performance.

Reserved 2025-03-07 | Published 2025-03-26 | Updated 2025-03-26 | Assigner Wordfence


HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-862 Missing Authorization

Product status

Default status
unaffected

*
affected

Timeline

2025-03-25:Disclosed

Credits

Michael Mazzolini finder

References

www.wordfence.com/...-b2ad-42b4-92a0-fb7293f6df06?source=cve

plugins.trac.wordpress.org/...6.30.15/classes/ajax.class.php

wordpress.org/plugins/wp-compress-image-optimizer/

plugins.trac.wordpress.org/changeset/3254259/

cve.org (CVE-2025-2110)

nvd.nist.gov (CVE-2025-2110)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-2110

Support options

Helpdesk Chat, Email, Knowledgebase