Unknown Autoptimize vulnerabilities

8 known vulnerabilities affecting unknown/autoptimize.

Total CVEs
8
CISA KEV
0
Public exploits
1
Exploited in wild
0
Severity breakdown
HIGH3MEDIUM5

Vulnerabilities

Page 1 of 1
CVE-2023-2113MEDIUMCVSS 4.8fixed in 3.1.72023-05-30
CVE-2023-2113 [MEDIUM] CWE-79 CVE-2023-2113: The Autoptimize WordPress plugin before 3.1.7 does not sanitise and escape the settings imported fro The Autoptimize WordPress plugin before 3.1.7 does not sanitise and escape the settings imported from a previous export, allowing high privileged users (such as an administrator) to inject arbitrary javascript into the admin panel, even when the unfiltered_html capability is disabled, such as in a multisite setup.
cvelistv5nvd
CVE-2022-4057MEDIUMCVSS 5.3PoCfixed in 3.1.02023-01-02
CVE-2022-4057 [MEDIUM] CWE-425 CVE-2022-4057: The Autoptimize WordPress plugin before 3.1.0 uses an easily guessable path to store plugin's export The Autoptimize WordPress plugin before 3.1.0 uses an easily guessable path to store plugin's exported settings and logs.
cvelistv5nvd
CVE-2022-2635MEDIUMCVSS 4.8≥ 3.1.1, < 3.1.12022-09-16
CVE-2022-2635 [MEDIUM] CWE-79 CVE-2022-2635: The Autoptimize WordPress plugin before 3.1.1 does not sanitise and escape some of its settings, whi The Autoptimize WordPress plugin before 3.1.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
cvelistv5nvd
CVE-2021-24376HIGHCVSS 7.2≥ 2.7.8, < 2.7.82021-06-21
CVE-2021-24376 [HIGH] CWE-434 Autoptimize < 2.7.8 - Arbitrary File Upload via "Import Settings" Autoptimize < 2.7.8 - Arbitrary File Upload via "Import Settings" The Autoptimize WordPress plugin before 2.7.8 attempts to delete malicious files (such as .php) form the uploaded archive via the "Import Settings" feature, after its extraction. However, the extracted folders are not checked and it is possible to upload a zip which contained a directory with PHP file in it and then it is not removed f
cvelistv5
CVE-2021-24377HIGHCVSS 7.2≥ 2.7.8, < 2.7.82021-06-21
CVE-2021-24377 [HIGH] CWE-362 Autoptimize < 2.7.8 - Race Condition leading to RCE Autoptimize < 2.7.8 - Race Condition leading to RCE The Autoptimize WordPress plugin before 2.7.8 attempts to remove potential malicious files from the extracted archive uploaded via the 'Import Settings' feature, however this is not sufficient to protect against RCE as a race condition can be achieved in between the moment the file is extracted on the disk but not yet removed. It is a bypass of CVE-2020-24948.
cvelistv5
CVE-2021-24378MEDIUMCVSS 4.8≥ 2.7.8, < 2.7.82021-06-21
CVE-2021-24378 [MEDIUM] CWE-79 CVE-2021-24378: The Autoptimize WordPress plugin before 2.7.8 does not check for malicious files such as .html in th The Autoptimize WordPress plugin before 2.7.8 does not check for malicious files such as .html in the archive uploaded via the 'Import Settings' feature. As a result, it is possible for a high privilege user to upload a malicious file containing JavaScript code inside an archive which will execute when a victim visits index.html inside the plugin dir
cvelistv5nvd
CVE-2021-24332MEDIUMCVSS 4.8≥ 2.8.4, < 2.8.42021-05-24
CVE-2021-24332 [MEDIUM] CWE-79 CVE-2021-24332: The Autoptimize WordPress plugin before 2.8.4 was missing proper escaping and sanitisation in some o The Autoptimize WordPress plugin before 2.8.4 was missing proper escaping and sanitisation in some of its settings, allowing high privilege users to set XSS payloads in them, leading to stored Cross-Site Scripting issues
cvelistv5nvd
CVE-2020-24948HIGHCVSS 7.2≥ 2.7.8, < 2.7.82020-09-03
CVE-2020-24948 [HIGH] CWE-434 CVE-2020-24948: The ao_ccss_import AJAX call in Autoptimize Wordpress Plugin 2.7.6 does not ensure that the file pro The ao_ccss_import AJAX call in Autoptimize Wordpress Plugin 2.7.6 does not ensure that the file provided is a legitimate Zip file, allowing high privilege users to upload arbitrary files, such as PHP, leading to remote command execution.
nvd