CVE-2021-24641

8.1 HIGH

📋 TL;DR

The Images to WebP WordPress plugin before version 1.9 lacks CSRF protection for administrative actions, allowing attackers to trick authenticated administrators into performing unauthorized actions. This vulnerability affects WordPress sites using vulnerable versions of the plugin, potentially leading to settings modification, denial-of-service, and arbitrary image conversion.

💻 Affected Systems

Products:
  • Images to WebP WordPress Plugin
Versions: All versions before 1.9
Operating Systems: All operating systems running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress administrator access (either legitimate or compromised) to be exploited via CSRF.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could modify plugin settings to disrupt site functionality, cause denial-of-service by exhausting server resources through malicious image conversion requests, or potentially chain with other vulnerabilities for further compromise.

🟠

Likely Case

Attackers trick administrators into clicking malicious links that modify plugin settings or trigger resource-intensive image conversions, causing service disruption or unwanted configuration changes.

🟢

If Mitigated

With proper CSRF protection and user awareness, the risk is significantly reduced as attackers cannot force unauthorized actions without administrator interaction.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires tricking an authenticated administrator into performing actions via CSRF, making it relatively straightforward for attackers with social engineering capabilities.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.9

Vendor Advisory: https://wpscan.com/vulnerability/972f8c5d-22b7-42de-a981-2e5acb72297b

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Images to WebP' plugin. 4. Click 'Update Now' if available, or manually update to version 1.9 or later. 5. Verify the plugin version after update.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Deactivate the vulnerable plugin until patching is possible

wp plugin deactivate images-to-webp

CSRF Protection Implementation

all

Add custom CSRF tokens to plugin admin endpoints (advanced users only)

🧯 If You Can't Patch

  • Remove the Images to WebP plugin entirely and use alternative image optimization solutions
  • Implement strict access controls and user awareness training to prevent administrators from clicking untrusted links

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins, find Images to WebP and verify version is below 1.9

Check Version:

wp plugin get images-to-webp --field=version

Verify Fix Applied:

Confirm plugin version is 1.9 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-admin/admin.php?page=images-to-webp
  • Multiple image conversion requests from single IP/session
  • Plugin settings changes without corresponding admin login

Network Indicators:

  • CSRF attack patterns with referer header manipulation
  • Unexpected POST requests to plugin admin endpoints

SIEM Query:

source="wordpress" AND (uri="/wp-admin/admin.php?page=images-to-webp" OR plugin="images-to-webp") AND status=200

🔗 References

📤 Share & Export