CVE-2024-13438
📋 TL;DR
This CSRF vulnerability in the SpeedSize Image & Video AI-Optimizer WordPress plugin allows unauthenticated attackers to trick administrators into clearing the plugin's CSS cache via malicious links. All WordPress sites using this plugin up to version 1.5.1 are affected. The attack requires social engineering to get an administrator to click a link.
💻 Affected Systems
- SpeedSize Image & Video AI-Optimizer WordPress Plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
An attacker could repeatedly clear the CSS cache, causing performance degradation and potential site display issues, while also using this as part of a multi-stage attack chain.
Likely Case
Temporary site performance issues and visual display problems due to cleared CSS cache, requiring administrator intervention to restore normal functionality.
If Mitigated
Minimal impact with proper CSRF protections and user awareness training, though the vulnerability still exists in the codebase.
🎯 Exploit Status
Exploitation requires social engineering to trick administrators but the technical complexity is low once the victim clicks the malicious link.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.5.2 or later
Restart Required: No
Instructions:
1. Log into WordPress admin dashboard
2. Navigate to Plugins → Installed Plugins
3. Find 'SpeedSize Image & Video AI-Optimizer'
4. Click 'Update Now' if available
5. Alternatively, download version 1.5.2+ from WordPress repository and manually update
🔧 Temporary Workarounds
Temporary Plugin Deactivation
allDeactivate the plugin until patched to prevent exploitation
wp plugin deactivate speedsize-ai-image-optimizer
CSRF Protection via .htaccess
linuxAdd basic CSRF protection headers at web server level
Header set X-Frame-Options "SAMEORIGIN"
Header set Content-Security-Policy "frame-ancestors 'self'"
🧯 If You Can't Patch
- Implement strict user awareness training about clicking unknown links
- Use web application firewall rules to detect and block CSRF patterns
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → SpeedSize Image & Video AI-Optimizer → Version number
Check Version:
wp plugin get speedsize-ai-image-optimizer --field=version
Verify Fix Applied:
Verify plugin version is 1.5.2 or higher in WordPress admin panel
📡 Detection & Monitoring
Log Indicators:
- Multiple POST requests to /wp-admin/admin-ajax.php with action=speedsize_clear_css_cache_action from unauthenticated or unexpected sources
- Unusual cache clearing events without corresponding admin activity
Network Indicators:
- CSRF attack patterns with forged requests to admin endpoints
- Suspicious referrer headers in requests to WordPress admin functions
SIEM Query:
source="wordpress.log" AND "speedsize_clear_css_cache_action" AND NOT user="admin_user"