Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 17 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 17 Dec 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mateuszgbiorczyk
Mateuszgbiorczyk converter For Media Wordpress Wordpress wordpress |
|
| Vendors & Products |
Mateuszgbiorczyk
Mateuszgbiorczyk converter For Media Wordpress Wordpress wordpress |
Wed, 17 Dec 2025 07:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Converter for Media – Optimize images | Convert WebP & AVIF plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `/webp-converter/v1/regenerate-attachment` REST endpoint in all versions up to, and including, 6.3.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete optimized WebP/AVIF variants for arbitrary attachments. | |
| Title | Converter for Media <= 6.3.2 - Missing Authorization to Authenticated (Subscriber+) Optimized Image Deletion via regenerate-attachment REST Endpoint | |
| Weaknesses | CWE-862 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:11:00.573Z
Reserved: 2025-11-26T16:51:27.349Z
Link: CVE-2025-13750
Updated: 2025-12-17T21:39:37.444Z
Status : Deferred
Published: 2025-12-17T07:15:58.293
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-13750
No data.
OpenCVE Enrichment
Updated: 2026-04-21T17:15:25Z