Insecure Direct Object Reference in Optimole Image Optimization Plugin for WordPress
CVE-2025-11519

4.3MEDIUM

What is CVE-2025-11519?

The Optimole plugin for WordPress experiences an Insecure Direct Object Reference vulnerability in all versions up to and including 4.1.0. This issue arises from insufficient validation on a user-controlled key via the /wp-json/optml/v1/move_image REST API endpoint. As a result, authenticated attackers with Author-level access and above can exploit this vulnerability to unlawfully offload media files that do not belong to them, potentially compromising the integrity and confidentiality of sensitive media resources.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Optimole – Optimize Images | Convert WebP & AVIF | CDN & Lazy Load | Image Optimization * <= 4.1.0

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Dmitrii Ignatyev
.