WordPress Plugin Vulnerabilities

Image optimization service by Optimole < 4.1.1 - Insecure Direct Object Reference to Authenticated (Author+) Media Offload

Description

The Optimole – Optimize Images | Convert WebP & AVIF | CDN & Lazy Load | Image Optimization plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.1.0 via the /wp-json/optml/v1/move_image REST API endpoint due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Author-level access and above, to offload media that doesn't belong to them.

Affects Plugins

Fixed in 4.1.1

References

Classification

Type
IDOR
CWE

Miscellaneous

Original Researcher
Dmitrii Ignatyev
Verified
No

Timeline

Publicly Published
2025-10-17 (about 6 months ago)
Added
2025-10-17 (about 6 months ago)
Last Updated
2025-10-18 (about 6 months ago)

Other