PT-2026-32092 · Optimole · Optimole – Optimize Images In Real Time

Published

2026-04-11

·

Updated

2026-04-11

·

CVE-2026-5226

CVSS v3.1

6.1

Medium

AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
The Optimole – Optimize Images in Real Time plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via URL paths in versions up to, and including, 4.2.3 This is due to insufficient output escaping on user-supplied URL paths in the get current url() function, which are inserted into JavaScript code via str replace() without proper JavaScript context escaping in the replace content() function. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.

Fix

XSS

Weakness Enumeration

Related Identifiers

CVE-2026-5226

Affected Products

Optimole – Optimize Images In Real Time