Vulnerabilities > Autoptimize
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2023-05-30 | CVE-2023-2113 | Unspecified vulnerability in Autoptimize The Autoptimize WordPress plugin before 3.1.7 does not sanitise and escape the settings imported from a previous export, allowing high privileged users (such as an administrator) to inject arbitrary javascript into the admin panel, even when the unfiltered_html capability is disabled, such as in a multisite setup. | 4.8 |
2021-06-21 | CVE-2021-24376 | Unrestricted Upload of File with Dangerous Type vulnerability in Autoptimize The Autoptimize WordPress plugin before 2.7.8 attempts to delete malicious files (such as .php) form the uploaded archive via the "Import Settings" feature, after its extraction. | 7.5 |
2021-06-21 | CVE-2021-24377 | Race Condition vulnerability in Autoptimize The Autoptimize WordPress plugin before 2.7.8 attempts to remove potential malicious files from the extracted archive uploaded via the 'Import Settings' feature, however this is not sufficient to protect against RCE as a race condition can be achieved in between the moment the file is extracted on the disk but not yet removed. | 6.8 |
2021-06-21 | CVE-2021-24378 | Cross-site Scripting vulnerability in Autoptimize The Autoptimize WordPress plugin before 2.7.8 does not check for malicious files such as .html in the archive uploaded via the 'Import Settings' feature. | 3.5 |
2021-05-24 | CVE-2021-24332 | Cross-site Scripting vulnerability in Autoptimize The Autoptimize WordPress plugin before 2.8.4 was missing proper escaping and sanitisation in some of its settings, allowing high privilege users to set XSS payloads in them, leading to stored Cross-Site Scripting issues | 4.8 |
2020-09-03 | CVE-2020-24948 | Unrestricted Upload of File with Dangerous Type vulnerability in Autoptimize The ao_ccss_import AJAX call in Autoptimize Wordpress Plugin 2.7.6 does not ensure that the file provided is a legitimate Zip file, allowing high privilege users to upload arbitrary files, such as PHP, leading to remote command execution. | 6.5 |