CVE-2025-2109
WP Compress <= 6.30.15 - Unauthenticated Server-Side Request Forgery via init Function
CVSS Score
5.8
EPSS Score
0.0%
EPSS Percentile
0th
The WP Compress – Instant Performance & Speed Optimization plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 6.30.15 via the init() function. This makes it possible for unauthenticated attackers to make web requests to arbitrary locations originating from the web application and can be used to query information from internal services.
| CWE | CWE-918 |
| Vendor | aresit |
| Product | wp compress – instant performance & speed optimization |
| Published | Mar 25, 2025 |
| Last Updated | Apr 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for aresit wp compress – instant performance & speed optimization
Be the first to know when new medium vulnerabilities affecting aresit wp compress – instant performance & speed optimization are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
aresit / WP Compress – Instant Performance & Speed Optimization
0 ≤ 6.30.15
References
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/10b9d703-de9d-472a-bdfb-bc9a41bf375e?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/wp-compress-image-optimizer/tags/6.30.15/wp-compress-core.php#L994 wordpress.org: https://wordpress.org/plugins/wp-compress-image-optimizer/#developers plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset/3254259/
Credits
Michael Mazzolini