Vulnerability Description
The WP Compress – Image Optimizer [All-In-One plugin for WordPress is vulnerable to Open Redirect in all versions up to, and including, 6.20.01. This is due to insufficient validation on the redirect url supplied via the 'css' parameter. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if they can successfully trick them into performing an action.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wpcompress | Wp Compress | < 6.20.02 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/changeset/3082085/wp-compress-image-optimizerPatch
- https://www.wordfence.com/threat-intel/vulnerabilities/id/cbbf9fbb-74fd-42eb-a78Third Party Advisory
- https://plugins.trac.wordpress.org/changeset/3082085/wp-compress-image-optimizerPatch
- https://www.wordfence.com/threat-intel/vulnerabilities/id/cbbf9fbb-74fd-42eb-a78Third Party Advisory
FAQ
What is CVE-2023-6812?
CVE-2023-6812 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The WP Compress – Image Optimizer [All-In-One plugin for WordPress is vulnerable to Open Redirect in all versions up to, and including, 6.20.01. This is due to insufficient validation on the redirect ...
How severe is CVE-2023-6812?
CVE-2023-6812 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-6812?
Check the references section above for vendor advisories and patch information. Affected products include: Wpcompress Wp Compress.