CVE-2025-13750

Converter for Media <= 6.3.2 - Missing Authorization to Authenticated (Subscriber+) Optimized Image Deletion via regenerate-attachment REST Endpoint

mediumMissing Authorization
4.3
CVSS Score
4.3
CVSS Score
medium
Severity
6.4.0
Patched in
1d
Time to patch

Description

The Converter for Media – Optimize images | Convert WebP & AVIF plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `/webp-converter/v1/regenerate-attachment` REST endpoint in all versions up to, and including, 6.3.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete optimized WebP/AVIF variants for arbitrary attachments.

CVSS Vector Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
None
Confidentiality
Low
Integrity
None
Availability

Technical Details

Affected versions<=6.3.2
PublishedDecember 16, 2025
Last updatedDecember 17, 2025

Source Code

WordPress.org SVN

Check if your site is affected.

Run a free security audit to detect vulnerable plugins, outdated versions, and misconfigurations.