CVE-2025-13750
Converter for Media <= 6.3.2 - Missing Authorization to Authenticated (Subscriber+) Optimized Image Deletion via regenerate-attachment REST Endpoint
mediumMissing Authorization
4.3
CVSS Score
4.3
CVSS Score
medium
Severity
6.4.0
Patched in
1d
Time to patch
Description
The Converter for Media – Optimize images | Convert WebP & AVIF plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `/webp-converter/v1/regenerate-attachment` REST endpoint in all versions up to, and including, 6.3.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete optimized WebP/AVIF variants for arbitrary attachments.
CVSS Vector Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:NAttack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
None
Confidentiality
Low
Integrity
None
Availability
Technical Details
Affected versions
<=6.3.2PublishedDecember 16, 2025
Last updatedDecember 17, 2025
Affected pluginwebp-converter-for-media
Source Code
WordPress.org SVNVulnerable v6.3.2
Patched v6.4.0
Check if your site is affected.
Run a free security audit to detect vulnerable plugins, outdated versions, and misconfigurations.