CVE-2025-3951

The WP-Optimize WordPress plugin before 4.2.0 does not properly escape user input when checking image compression statuses, which could allow users with the administrator role to conduct SQL Injection attacks in the context of Multi-Site WordPress configurations.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

cpe:2.3:a:updraftplus:wp-optimize:*:*:*:*:*:wordpress:*:*

History

09 Jun 2025, 20:54

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/220c195f-3df3-4883-8e0b-a0cf019e6323/ - () https://wpscan.com/vulnerability/220c195f-3df3-4883-8e0b-a0cf019e6323/ - Exploit, Third Party Advisory
CWE CWE-89
CPE cpe:2.3:a:updraftplus:wp-optimize:*:*:*:*:*:wordpress:*:*
First Time Updraftplus
Updraftplus wp-optimize

02 Jun 2025, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-06-02 06:15

Updated : 2025-06-09 20:54


NVD link : CVE-2025-3951

Mitre link : CVE-2025-3951


JSON object : View

Products Affected

updraftplus

  • wp-optimize
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')