Description
Server-Side Request Forgery (SSRF) vulnerability in WP Compress WP Compress for MainWP wp-compress-mainwp allows Server Side Request Forgery.This issue affects WP Compress for MainWP: from n/a through <= 6.30.03.
Published: 2025-03-28
Score: 4.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

This vulnerability allows an attacker to trick the server into connecting to arbitrary URLs requested via the WP Compress for MainWP plugin. The resultant SSRF could expose internal services, retrieve sensitive data, or perform malicious traffic from the server, potentially impacting confidentiality and network reachability.

Affected Systems

WP Compress for MainWP plugin versions up to and including 6.30.03 are affected; earlier releases are also vulnerable as the issue is noted to apply from n/a through <= 6.30.03.

Risk and Exploitability

The CVSS score of 4.9 indicates a moderate risk level. The EPSS score of less than 1% signals a very low probability of exploitation at present. The vulnerability is not listed in the CISA KEV catalog. Attackers would need to exploit through the plugin’s input handling, which requires access to the WordPress site’s backend or some other form of authenticated interaction with the plugin’s processing logic.

Generated by OpenCVE AI on May 1, 2026 at 12:31 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade WP Compress for MainWP to version 6.30.04 or later to eliminate the SSRF flaw.
  • If immediate update is not feasible, deactivate the plugin from the WordPress admin or restrict its use to trusted users only.
  • Implement a WAF rule or network policy that blocks outbound requests originating from the plugin to prevent SSRF exploitation until the patch is applied.

Generated by OpenCVE AI on May 1, 2026 at 12:31 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-8565 Server-Side Request Forgery (SSRF) vulnerability in WP Compress WP Compress for MainWP allows Server Side Request Forgery. This issue affects WP Compress for MainWP: from n/a through 6.30.03.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Server-Side Request Forgery (SSRF) vulnerability in WP Compress WP Compress for MainWP allows Server Side Request Forgery. This issue affects WP Compress for MainWP: from n/a through 6.30.03. Server-Side Request Forgery (SSRF) vulnerability in WP Compress WP Compress for MainWP wp-compress-mainwp allows Server Side Request Forgery.This issue affects WP Compress for MainWP: from n/a through <= 6.30.03.
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Fri, 28 Mar 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 28 Mar 2025 09:45:00 +0000

Type Values Removed Values Added
Description Server-Side Request Forgery (SSRF) vulnerability in WP Compress WP Compress for MainWP allows Server Side Request Forgery. This issue affects WP Compress for MainWP: from n/a through 6.30.03.
Title WordPress WP Compress for MainWP plugin <= 6.30.03 - Server Side Request Forgery (SSRF) vulnerability
Weaknesses CWE-918
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:04.808Z

Reserved: 2025-03-26T09:25:58.779Z

Link: CVE-2025-31076

cve-icon Vulnrichment

Updated: 2025-03-28T13:47:58.160Z

cve-icon NVD

Status : Deferred

Published: 2025-03-28T10:15:16.610

Modified: 2026-04-23T15:27:39.630

Link: CVE-2025-31076

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T12:45:15Z

Weaknesses