Description
The Optimole – Optimize Images | Convert WebP & AVIF | CDN & Lazy Load | Image Optimization plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.1.0 via the /wp-json/optml/v1/move_image REST API endpoint due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Author-level access and above, to offload media that doesn't belong to them.
Published: 2025-10-18
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Media Offload
Action: Patch
AI Analysis

Impact

The vulnerability is an insecure direct object reference in the Optimole WordPress plugin, caused by missing validation on a user‑controlled key used in the /wp-json/optml/v1/move_image REST API endpoint. This flaw allows any authenticated user with Author level access or higher to offload media that does not belong to them, exposing content from other users.

Affected Systems

All installations of the Optimole – Optimize Images plugin for WordPress with version 4.1.0 or earlier are affected. The issue affects the plugin component that handles media offloading via its REST API. No newer version information is provided in the available data.

Risk and Exploitability

The CVSS score of 4.3 denotes moderate severity, and the EPSS score of less than 1% indicates a low probability of exploitation at this time. The vulnerability is not listed in CISA KEV catalog. Exploitation requires an authenticated WordPress user with author or higher privileges accessing the move_image endpoint. Once the request contains a valid, but unauthorized, key, the attacker may trigger a transfer of an arbitrary media file owned by another user, leading to cross‑tenant data leakage or disruption of the target user’s content.

Generated by OpenCVE AI on April 22, 2026 at 14:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Optimole plugin to a release newer than 4.1.0.
  • If an immediate upgrade is not feasible, restrict access to the /wp-json/optml/v1/move_image endpoint for Author and higher roles by configuring server rules or a firewall, or modify the WordPress roles so that those users lack the capability to trigger the endpoint.
  • Implement or enforce ACL checks so that the plugin validates ownership before permitting media offloading, ensuring that only the file owner can initiate the process.

Generated by OpenCVE AI on April 22, 2026 at 14:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 20 Oct 2025 20:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 20 Oct 2025 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Optimole
Optimole optimize Images
Wordpress
Wordpress wordpress
Vendors & Products Optimole
Optimole optimize Images
Wordpress
Wordpress wordpress

Sat, 18 Oct 2025 07:00:00 +0000

Type Values Removed Values Added
Description The Optimole – Optimize Images | Convert WebP & AVIF | CDN & Lazy Load | Image Optimization plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.1.0 via the /wp-json/optml/v1/move_image REST API endpoint due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Author-level access and above, to offload media that doesn't belong to them.
Title Image optimization service by Optimole <= 4.1.0 - Insecure Direct Object Reference to Authenticated (Author+) Media Offload
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Optimole Optimize Images
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:09:28.373Z

Reserved: 2025-10-08T17:29:21.851Z

Link: CVE-2025-11519

cve-icon Vulnrichment

Updated: 2025-10-20T19:02:45.747Z

cve-icon NVD

Status : Deferred

Published: 2025-10-18T07:15:35.533

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-11519

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T14:15:20Z

Weaknesses