Impact
The WP Compress – Instant Performance & Speed Optimization plugin contains a Server‑Side Request Forgery flaw in its init() function. This flaw allows an unauthenticated remote user to cause the plugin to send arbitrary HTTP or HTTPS requests from the host on which the WordPress site is running. As a result an attacker can probe internal network services, retrieve configuration data, or access resources that are otherwise unreachable from the Internet.
Affected Systems
Any installation of the WP Compress plugin version 6.30.15 or older is affected. The vulnerability has been identified in the plugin released by aresit for WordPress and applies to all WordPress sites that have not updated past that version.
Risk and Exploitability
The CVSS score of 5.8 indicates moderate severity, and the EPSS score of less than 1% points to a low likelihood of exploitation. The vulnerability is not catalogued in CISA’s KEV list, suggesting no widespread exploitation has been reported. Attackers would need network access to the WordPress server and no authentication; once accessed, they could craft SSRF requests to internal or privileged endpoints to gather sensitive information.
OpenCVE Enrichment
EUVD