CVE-2025-8723
Cloudflare Image Resizing <= 1.5.6 - Missing Authentication to Unauthenticated Remote Code Execution via rest_pre_dispatch Hook
CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th
The Cloudflare Image Resizing plugin for WordPress is vulnerable to Remote Code Execution due to missing authentication and insufficient sanitization within its hook_rest_pre_dispatch() method in all versions up to, and including, 1.5.6. This makes it possible for unauthenticated attackers to inject arbitrary PHP into the codebase, achieving remote code execution.
| CWE | CWE-94 |
| Vendor | mecanik |
| Product | cloudflare image resizing – optimize & accelerate your images |
| Published | Aug 19, 2025 |
| Last Updated | Apr 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for mecanik cloudflare image resizing – optimize & accelerate your images
Be the first to know when new critical vulnerabilities affecting mecanik cloudflare image resizing – optimize & accelerate your images are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
mecanik / Cloudflare Image Resizing – Optimize & Accelerate Your Images
0 ≤ 1.5.6
References
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/0f3b3c1a-1d45-4e2f-854a-171fe759257b?source=cve wordpress.org: https://wordpress.org/plugins/cf-image-resizing/#developers plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset/3337593/ plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset/3341917/
Credits
Kenneth Dunn