Input validation vulnerability in Image Optimizer, Resizer and CDN – Sirv 7.2.6

The Sirv plugin for WordPress, which optimizes, resizes, and uses a CDN for images, has a security vulnerability. This is because it does not check the type of file being uploaded in the sirv_upload_file_by_chanks AJAX action. This means that anyone who is logged in as a Contributor or higher can upload any type of file to the website’s server, potentially allowing them to run harmful code.

Detected in:

Image Optimizer, Resizer and CDN – Sirv fixed vulnerable versions: >= * <= 7.2.6

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.