Impact
ShortPixel Image Optimizer for WordPress contains a stored cross‑site scripting flaw that allows an authenticated user with Author-level access or higher to insert malicious JavaScript into an attachment title. When a higher‑privileged user opens the ShortPixel AI editor popup for that attachment, the vulnerability causes the script to execute in the victim’s browser, compromising the confidentiality or integrity of the browser session.
Affected Systems
This issue affects WordPress installations running ShortPixel Image Optimizer version 6.4.3 or any earlier release. Sites that use the plugin for image optimization, WebP/AVIF conversion, or background removal are vulnerable if the plugin has not been updated beyond the affected versions.
Risk and Exploitability
The CVSS score of 5.4 indicates moderate severity, and the vulnerability is not listed in CISA’s KEV catalog. EPSS data is currently unavailable. The likely attack vector is through the WordPress REST API, as authors can set arbitrary attachment titles that break out of an HTML attribute; this inference follows the description that the flaw is triggered by a crafted post_title. Exploitation requires the attacker to possess Author or higher privileges to create or modify an attachment and relies on the target user opening the editor popup to trigger the injected script.
OpenCVE Enrichment