CVE-2025-14482

4.3 MEDIUM

📋 TL;DR

The Crush.pics WordPress plugin has a missing capability check vulnerability that allows authenticated users with Subscriber-level access or higher to modify plugin settings. This includes disabling auto-compression and changing image quality settings. All WordPress sites using this plugin up to version 1.8.7 are affected.

💻 Affected Systems

Products:
  • Crush.pics Image Optimizer - Image Compression and Optimization plugin for WordPress
Versions: All versions up to and including 1.8.7
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin enabled. Any authenticated user (Subscriber role or higher) can exploit this.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could disable image optimization entirely, leading to degraded site performance, increased bandwidth costs, and potential SEO impact from slow-loading images.

🟠

Likely Case

Malicious users could disrupt image optimization workflows, causing inconsistent image quality across the site and minor performance degradation.

🟢

If Mitigated

With proper user access controls and monitoring, impact would be limited to temporary configuration changes that could be quickly reverted.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward via AJAX endpoints. The vulnerability is publicly documented with code references.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.8.8 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3210000%40crush-pics%2F1.8.8&old=3190000%40crush-pics%2F1.8.7

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Crush.pics Image Optimizer'. 4. Click 'Update Now' if available, or download version 1.8.8+ from WordPress repository. 5. Activate the updated plugin.

🔧 Temporary Workarounds

Temporary plugin deactivation

all

Disable the Crush.pics plugin until patched

wp plugin deactivate crush-pics

Restrict user roles

all

Limit Subscriber and Contributor role access or remove unnecessary user accounts

🧯 If You Can't Patch

  • Implement strict user access controls and review all authenticated user accounts
  • Monitor plugin settings changes and implement alerting for unauthorized modifications

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for Crush.pics version. If version is 1.8.7 or lower, you are vulnerable.

Check Version:

wp plugin get crush-pics --field=version

Verify Fix Applied:

After updating, verify the plugin version shows 1.8.8 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual AJAX requests to /wp-admin/admin-ajax.php with action parameters related to crush-pics
  • Plugin setting changes from non-admin users

Network Indicators:

  • POST requests to admin-ajax.php with crush-pics related parameters from non-admin IPs

SIEM Query:

source="wordpress.log" AND "admin-ajax.php" AND "action=crush_pics" AND (user_role="subscriber" OR user_role="contributor")

🔗 References

📤 Share & Export