ShortPixel Image Optimizer – Optimize Images, Convert WebP & AVIF V…

ShortPixel Image Optimizer – Optimize Images, Convert WebP & AVIF V…

by | Mar 25, 2026 | Plugins

Attack Vectors

CVE-2026-4335 is a Medium severity (CVSS 5.4) Stored Cross-Site Scripting (XSS) issue affecting ShortPixel Image Optimizer – Optimize Images, Convert WebP & AVIF (slug: shortpixel-image-optimiser) in versions 6.4.3 and below.

The attack requires an authenticated WordPress user with at least Author permissions (Author+). The attacker can place a malicious script into an attachment title (the media item’s post_title).

Because the script is stored, it can execute later when a legitimate user views the affected ShortPixel media/editor popup. This makes the impact depend on who triggers the view (for example, an Editor, Admin, or marketing staff member managing media assets).

Security Weakness

The vulnerability is caused by insufficient output escaping when rendering the attachment title inside the ShortPixel editor popup UI.

Per the published advisory, the attachment’s post_title is retrieved from the database and passed into the popup template, where it is rendered into an HTML input element’s value attribute without appropriate escaping (specifically, missing esc_attr() in the related template path). As a result, a crafted attachment title can break out of the attribute context and inject script that runs in a victim’s browser.

Remediation: Update ShortPixel Image Optimizer to 6.4.4 or a newer patched version.

Technical or Business Impacts

Stored XSS is often a “business process” threat as much as a technical one: it targets trusted users during normal workflows (like uploading creative assets and editing media), which is common in marketing-led WordPress environments.

Potential impacts include:

  • Account and session compromise: If an administrator or other privileged user triggers the malicious popup, the attacker may be able to act in that user’s session (depending on browser protections and site configuration).
  • Unauthorized site changes: Malicious actions could include modifying content, injecting unwanted links, changing settings, or creating persistence mechanisms—directly impacting brand trust and lead-gen performance.
  • Compliance and incident-response overhead: Even a Medium-severity issue can create reporting, forensic, and remediation costs, especially if a third party claims exposure of visitor or customer data.
  • Operational disruption: Marketing teams may need to pause publishing or asset updates while media libraries are reviewed, cleaned, and access is audited.

From a leadership perspective (CEO/COO/CFO/Compliance), the most important factor is that this is an authenticated issue: the risk is elevated in organizations with many contributor accounts, shared credentials, contractor access, or weak offboarding processes.

Similar Attacks

Stored XSS has repeatedly been used to hijack trusted user sessions and spread malicious code through normal user interactions. Notable real-world examples include:

While the context differs, the lesson is consistent: when scripts can be stored in content and later executed in a trusted user’s browser, the outcome can be disproportionate to the initial foothold—especially in content-management environments like WordPress.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers