CVE-2024-1934
📋 TL;DR
This vulnerability in the WP Compress – Image Optimizer WordPress plugin allows unauthenticated attackers to reset the CDN region and set malicious URLs for image delivery. It affects all versions up to and including 6.11.10 due to a missing capability check. Any WordPress site using this vulnerable plugin is at risk.
💻 Affected Systems
- WP Compress – Image Optimizer WordPress plugin
📦 What is this software?
Wp Compress by Wpcompress
⚠️ Risk & Real-World Impact
Worst Case
Attackers could redirect all images on the site to malicious domains, enabling phishing campaigns, malware distribution, or complete site defacement through image substitution.
Likely Case
Attackers will set malicious CDN URLs to serve compromised images, potentially delivering malware or conducting phishing attacks against site visitors.
If Mitigated
With proper web application firewalls and monitoring, attacks can be detected and blocked before causing significant damage.
🎯 Exploit Status
The vulnerability requires no authentication and has a simple exploitation path, making it attractive for attackers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions after 6.11.10
Restart Required: No
Instructions:
1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find WP Compress – Image Optimizer
4. Click 'Update Now' if available
5. If no update available, deactivate and remove the plugin immediately
🔧 Temporary Workarounds
Deactivate Plugin
allTemporarily disable the vulnerable plugin until patched version is available
wp plugin deactivate wp-compress-image-optimizer
Web Application Firewall Rule
allBlock requests to the vulnerable endpoint
Add WAF rule to block requests containing 'wps_local_compress' in URL or parameters
🧯 If You Can't Patch
- Deactivate the WP Compress plugin immediately and use alternative image optimization solutions
- Implement strict WAF rules to block unauthenticated requests to plugin endpoints
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → WP Compress → Version number. If version is 6.11.10 or lower, you are vulnerable.
Check Version:
wp plugin get wp-compress-image-optimizer --field=version
Verify Fix Applied:
After updating, verify plugin version is higher than 6.11.10 in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to wp-admin/admin-ajax.php with 'action' parameter containing 'wps_local_compress'
- Multiple failed authentication attempts followed by successful plugin endpoint access
Network Indicators:
- Unusual outbound connections to new CDN domains from WordPress server
- HTTP requests modifying CDN configuration without authentication
SIEM Query:
source="wordpress.log" AND ("wps_local_compress" OR "wp-compress") AND status=200 AND user="-"
🔗 References
- https://plugins.trac.wordpress.org/browser/wp-compress-image-optimizer/tags/6.10.35/addons/legacy/compress.php
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3054445@wp-compress-image-optimizer/trunk&old=3048575@wp-compress-image-optimizer/trunk&sfp_email=&sfph_mail=#file2
- https://www.wordfence.com/threat-intel/vulnerabilities/id/88a46a24-6d46-44cc-ac01-70a1c329cb51?source=cve
- https://plugins.trac.wordpress.org/browser/wp-compress-image-optimizer/tags/6.10.35/addons/legacy/compress.php
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3054445@wp-compress-image-optimizer/trunk&old=3048575@wp-compress-image-optimizer/trunk&sfp_email=&sfph_mail=#file2
- https://www.wordfence.com/threat-intel/vulnerabilities/id/88a46a24-6d46-44cc-ac01-70a1c329cb51?source=cve