CVE-2025-8778

4.3 MEDIUM

📋 TL;DR

The NitroPack WordPress plugin has an authorization vulnerability that allows authenticated users with Subscriber-level access or higher to modify plugin compression settings. This occurs because the nitropack_set_compression_ajax() function lacks proper capability checks. All WordPress sites using NitroPack version 1.18.4 or earlier are affected.

💻 Affected Systems

Products:
  • NitroPack WordPress Plugin
Versions: All versions up to and including 1.18.4
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with NitroPack plugin installed and at least one authenticated user account (Subscriber role or higher).

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could disable compression settings, potentially degrading site performance or causing compatibility issues, though no direct data loss or code execution occurs.

🟠

Likely Case

Malicious users with basic accounts could tamper with compression settings, affecting site performance optimization without causing major damage.

🟢

If Mitigated

With proper user role management and plugin updates, impact is minimal as this doesn't allow privilege escalation or data access.

🌐 Internet-Facing: MEDIUM - WordPress sites are typically internet-facing, and many allow user registration, making exploitation possible from external sources.
🏢 Internal Only: LOW - If the site doesn't allow user registration or has strict access controls, risk is limited to already-trusted users.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access but only basic Subscriber privileges. Exploitation involves sending crafted AJAX requests to the vulnerable endpoint.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 1.18.5 or later

Vendor Advisory: https://wordpress.org/plugins/nitropack/#developers

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find NitroPack and click 'Update Now'. 4. Verify version is 1.18.5 or higher.

🔧 Temporary Workarounds

Disable User Registration

all

Prevent new user accounts from being created to limit potential attackers.

In WordPress Settings → General, uncheck 'Anyone can register'

Remove NitroPack Plugin

all

Temporarily disable the plugin until patched.

In WordPress admin: Plugins → Installed Plugins → NitroPack → Deactivate

🧯 If You Can't Patch

  • Restrict user registration to prevent new Subscriber accounts
  • Audit existing user accounts and remove any suspicious or unnecessary Subscriber-level users

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins → NitroPack version. If version is 1.18.4 or lower, you are vulnerable.

Check Version:

wp plugin list --name=nitropack --field=version (if WP-CLI installed)

Verify Fix Applied:

After updating, verify NitroPack version shows 1.18.5 or higher in WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual AJAX requests to /wp-admin/admin-ajax.php with action=nitropack_set_compression
  • Multiple compression setting changes from non-admin users

Network Indicators:

  • POST requests to admin-ajax.php with nitropack_set_compression parameter from non-admin IPs

SIEM Query:

source="wordpress.log" AND "admin-ajax.php" AND "nitropack_set_compression" AND NOT user_role="administrator"

🔗 References

📤 Share & Export