WP Compress – Instant Performance & Speed Optimization Vulnerabilit…

WP Compress – Instant Performance & Speed Optimization Vulnerabilit…

by | Feb 24, 2026 | Plugins

Attack Vectors

CVE-2026-25370 affects WP Compress – Instant Performance & Speed Optimization (slug: wp-compress-image-optimizer) in versions <= 6.60.28. Because this is a missing authorization issue with no privileges required (CVSS:3.1/AV:N/AC:L/PR:N/UI:N), an attacker can attempt exploitation remotely over the internet without a valid WordPress login.

In practical terms, any site that exposes the affected plugin functionality to public requests may be a target. This is especially relevant for marketing and corporate sites that prioritize performance plugins and typically keep broad public access to front-end endpoints.

Security Weakness

This is a Medium-severity vulnerability (CVSS 5.3) caused by a missing capability check on a plugin function. In WordPress, capability checks are a key control that ensures only authorized roles (for example, admins) can trigger sensitive actions.

According to the public report, the weakness can allow unauthenticated attackers to perform an unauthorized action. The exact action depends on the vulnerable function path, but the business concern is clear: the plugin may accept sensitive requests without confirming the caller is allowed to do so.

Remediation note: no known patch is currently available. The safest risk-based approach may be to disable/uninstall the affected software and replace it with an alternative, particularly for sites with strict compliance or brand-risk requirements. Source: Wordfence vulnerability advisory.

Technical or Business Impacts

Even when confidentiality and availability impacts are reported as none in the CVSS vector (C:N/I:L/A:N), the stated integrity impact (I:L) matters for business outcomes. Unauthorized actions can lead to unwanted changes that undermine site quality, performance, or trust signals that marketing teams depend on.

Potential business impacts include:

Brand and revenue risk: If an attacker can trigger unauthorized actions that affect site behavior, your customer journey (page speed, lead capture, product discovery) can degrade without clear root cause, impacting conversion rates and campaign performance.

Operational and compliance pressure: Incident response, emergency vendor reviews, and expedited change management consume staff time across Marketing, IT, and Compliance. If your organization has regulatory obligations or contractual security requirements, running unpatched software may increase audit findings and vendor-risk exposure.

Recommended mitigations (given no known patch): consider uninstalling the plugin, limiting exposure with a WAF or firewall rules where feasible, tightening WordPress hardening (least privilege, strong admin authentication), and increasing monitoring/alerting for unusual requests and unexpected site changes.

Similar Attacks

Missing authorization and unauthenticated action flaws are a recurring pattern in the WordPress ecosystem. Examples of real, publicly documented incidents include:

CVE-2021-34646 (WooCommerce Payments) — unauthenticated admin creation
CVE-2020-25213 (WordPress File Manager) — unauthenticated remote code execution
CVE-2017-1001000 (WordPress REST API) — content injection

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers