CVE-2024-13438

4.3 MEDIUM

📋 TL;DR

This CSRF vulnerability in the SpeedSize Image & Video AI-Optimizer WordPress plugin allows unauthenticated attackers to trick administrators into clearing the plugin's CSS cache via malicious links. All WordPress sites using this plugin up to version 1.5.1 are affected. The attack requires social engineering to get an administrator to click a link.

💻 Affected Systems

Products:
  • SpeedSize Image & Video AI-Optimizer WordPress Plugin
Versions: All versions up to and including 1.5.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All WordPress installations using the vulnerable plugin versions are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could repeatedly clear the CSS cache, causing performance degradation and potential site display issues, while also using this as part of a multi-stage attack chain.

🟠

Likely Case

Temporary site performance issues and visual display problems due to cleared CSS cache, requiring administrator intervention to restore normal functionality.

🟢

If Mitigated

Minimal impact with proper CSRF protections and user awareness training, though the vulnerability still exists in the codebase.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires social engineering to trick administrators but the technical complexity is low once the victim clicks the malicious link.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.5.2 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3236368%40speedsize-ai-image-optimizer&new=3236368%40speedsize-ai-image-optimizer&sfp_email=&sfph_mail=

Restart Required: No

Instructions:

1. Log into WordPress admin dashboard
2. Navigate to Plugins → Installed Plugins
3. Find 'SpeedSize Image & Video AI-Optimizer'
4. Click 'Update Now' if available
5. Alternatively, download version 1.5.2+ from WordPress repository and manually update

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Deactivate the plugin until patched to prevent exploitation

wp plugin deactivate speedsize-ai-image-optimizer

CSRF Protection via .htaccess

linux

Add basic CSRF protection headers at web server level

Header set X-Frame-Options "SAMEORIGIN"
Header set Content-Security-Policy "frame-ancestors 'self'"

🧯 If You Can't Patch

  • Implement strict user awareness training about clicking unknown links
  • Use web application firewall rules to detect and block CSRF patterns

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → SpeedSize Image & Video AI-Optimizer → Version number

Check Version:

wp plugin get speedsize-ai-image-optimizer --field=version

Verify Fix Applied:

Verify plugin version is 1.5.2 or higher in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Multiple POST requests to /wp-admin/admin-ajax.php with action=speedsize_clear_css_cache_action from unauthenticated or unexpected sources
  • Unusual cache clearing events without corresponding admin activity

Network Indicators:

  • CSRF attack patterns with forged requests to admin endpoints
  • Suspicious referrer headers in requests to WordPress admin functions

SIEM Query:

source="wordpress.log" AND "speedsize_clear_css_cache_action" AND NOT user="admin_user"

🔗 References

📤 Share & Export