Impact
The vulnerability allows an attacker to traverse directories through the Smush Image Compression and Optimization plugin, potentially accessing arbitrary files on the server. The flaw lies in how the plugin processes file paths, permitting users to request files outside the intended directory. Creating a clean path with repeated slashes can bypass normal path checks, enabling read access to sensitive files such as configuration or private data. The impact is primarily confidentiality loss, as the attacker could read files that are not supposed to be publicly available.
Affected Systems
The flaw affects the WordPress plugin Smush Image Compression and Optimization provided by WPMU DEV, from its earliest releases up to and including version 3.17.0. No other versions are listed as vulnerable.
Risk and Exploitability
The CVSS score of 4.1 indicates a moderate risk level. The EPSS score is reported as less than 1%, suggesting that the likelihood of exploitation is currently low. The vulnerability is not listed in the CISA KEV catalog, implying it is not widely known to be exploited in the wild. The likely attack vector is through a crafted URL or payload delivered to a user with sufficient privileges to interact with the plugin, potentially allowing remote exploitation. The vulnerability would only be usable if the attacker can reach the plugin endpoint and generate a traversal request.
OpenCVE Enrichment