Description
The Flying Images: Optimize and Lazy Load Images for Faster Page Speed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 2.4.14 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Published: 2025-11-01
Score: 4.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Apply Patch
AI Analysis

Impact

The Flying Images plugin contains a stored cross‑site scripting flaw that allows an attacker with administrator privileges to inject arbitrary JavaScript into the plugin’s configuration settings. The injected code is rendered when any visitor loads a page that includes the plugin’s output.

Affected Systems

The issue affects the WordPress plug‑in Flying Images: Optimize and Lazy Load Images for Faster Page Speed, versions up to and including 2.4.14. It is relevant for multi‑site WordPress installations or sites where the unfiltered_html capability has been disabled.

Risk and Exploitability

The CVSS score of 4.4 indicates medium severity; the EPSS score of less than 1% suggests low utilization probability, and the vulnerability is not listed in CISA KEV. Exploitation requires valid administrator credentials on a multi‑site or unfiltered_html‑restricted site, after which the attacker can inject and persist malicious scripts that execute for any user who views affected pages.

Generated by OpenCVE AI on April 21, 2026 at 18:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Flying Images plugin to a version newer than 2.4.14 if one is available.
  • If no newer release exists, deactivate or uninstall the plugin to eliminate the attack surface.
  • Review user accounts and remove or demote unnecessary administrator privileges to reduce the risk that an attacker can obtain the required access.

Generated by OpenCVE AI on April 21, 2026 at 18:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 03 Nov 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 03 Nov 2025 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Sat, 01 Nov 2025 04:45:00 +0000

Type Values Removed Values Added
Description The Flying Images: Optimize and Lazy Load Images for Faster Page Speed plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 2.4.14 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled.
Title Flying Images: Optimize and Lazy Load Images for Faster Page Speed <= 2.4.14 - Authenticated (Admin+) Stored Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 4.4, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:20:32.584Z

Reserved: 2025-10-17T20:37:23.703Z

Link: CVE-2025-11927

cve-icon Vulnrichment

Updated: 2025-11-03T13:10:51.190Z

cve-icon NVD

Status : Deferred

Published: 2025-11-01T05:16:02.267

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-11927

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T18:45:06Z

Weaknesses