Insecure Direct Object Reference in Optimole Image Optimization Plugin for WordPress
CVE-2025-11519

4.3MEDIUM

What is CVE-2025-11519?

The Optimole plugin for WordPress experiences an Insecure Direct Object Reference vulnerability in all versions up to and including 4.1.0. This issue arises from insufficient validation on a user-controlled key via the /wp-json/optml/v1/move_image REST API endpoint. As a result, authenticated attackers with Author-level access and above can exploit this vulnerability to unlawfully offload media files that do not belong to them, potentially compromising the integrity and confidentiality of sensitive media resources.

Affected Version(s)

Optimole – Optimize Images | Convert WebP & AVIF | CDN & Lazy Load | Image Optimization * <= 4.1.0

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Dmitrii Ignatyev
.
CVE-2025-11519 : Insecure Direct Object Reference in Optimole Image Optimization Plugin for WordPress