{"uuid": "e889ebfe-8fe6-4865-b4a5-5ec03a848eec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-2110", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/8829", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-2110\n\ud83d\udd25 CVSS Score: 8.8 (cvssV3_1, Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)\n\ud83d\udd39 Description: The WP Compress \u2013 Instant Performance &amp; Speed Optimization plugin for WordPress is vulnerable to unauthorized access, modification, and loss of data due to missing capability checks on its on its AJAX functions in all versions up to, and including, 6.30.15. This makes it possible for authenticated attackers, with Subscriber-level access and above, to compromise the site in various ways depending on the specific function exploited - for example, by retrieving sensitive settings and configuration details, or by altering and deleting them, thereby disclosing sensitive information, disrupting the plugin\u2019s functionality, and potentially impacting overall site performance.\n\ud83d\udccf Published: 2025-03-26T11:22:08.756Z\n\ud83d\udccf Modified: 2025-03-26T11:22:08.756Z\n\ud83d\udd17 References:\n1. https://www.wordfence.com/threat-intel/vulnerabilities/id/2bb4ead4-b2ad-42b4-92a0-fb7293f6df06?source=cve\n2. https://plugins.trac.wordpress.org/browser/wp-compress-image-optimizer/tags/6.30.15/classes/ajax.class.php\n3. https://wordpress.org/plugins/wp-compress-image-optimizer/#developers\n4. https://plugins.trac.wordpress.org/changeset/3254259/", "creation_timestamp": "2025-03-26T11:25:21.000000Z"}