Vulnerability Details: Authenticated Settings Change Vulnerability in MegaOptim Image Optimizer
One of the changelog entries for the latest version of the plugin MegaOptim Image Optimizer is “Security Improvements”. Looking at the changes made in that version it appears that refers to checking if the user making requests to the plugin’s AJAX accessible functions in the file /includes/classes/MGO_Ajax.php are logged in to WordPress. That serves no purpose since those are registered to only be accessible by those logged in WordPress. While looking into that we found that at least with the function to handle saving the plugin’s settings there should be a check to limit what level of logged user can access it, but it is missing. We have notified the developer of that.
...
This post provides insights on a vulnerability in the WordPress plugin MegaOptim Image Optimizer not discovered by us, where the discoverer hadn't provided the details needed for us to confirm the vulnerability while we were adding it to the data set for our service, so the rest of its contents are limited to subscribers of our service.
If you were using our service, you would have already been warned about this vulnerability if your website is vulnerable due to it. You can try out our service for free and then see the rest of the details of the vulnerability.
For existing customers, please log in to your account to view the rest of the contents of the post.