Vulnerabilities and security researches forautoptimize autoptimize
Direction: ascendingJun 07, 2024
Autoptimize # CVE-2021-24332
- CVE, Research URL
- Home page URL
- Application
- Date
- May 24, 2021
- Research Description
- The Autoptimize WordPress plugin before 2.8.4 was missing proper escaping and sanitisation in some of its settings, allowing high privilege users to set XSS payloads in them, leading to stored Cross-Site Scripting issues
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Autoptimize # CVE-2020-24948
- CVE, Research URL
- Home page URL
- Application
- Date
- Sep 03, 2020
- Research Description
- The ao_ccss_import AJAX call in Autoptimize Wordpress Plugin 2.7.6 does not ensure that the file provided is a legitimate Zip file, allowing high privilege users to upload arbitrary files, such as PHP, leading to remote command execution.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Autoptimize # CVE-2022-2635
- CVE, Research URL
- Home page URL
- Application
- Date
- Sep 16, 2022
- Research Description
- The Autoptimize WordPress plugin before 3.1.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Autoptimize # CVE-2022-4057
- CVE, Research URL
- Home page URL
- Application
- Date
- Jan 03, 2023
- Research Description
- The Autoptimize WordPress plugin before 3.1.0 uses an easily guessable path to store plugin's exported settings and logs.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Autoptimize # CVE-2021-24378
- CVE, Research URL
- Home page URL
- Application
- Date
- Jun 22, 2021
- Research Description
- The Autoptimize WordPress plugin before 2.7.8 does not check for malicious files such as .html in the archive uploaded via the 'Import Settings' feature. As a result, it is possible for a high privilege user to upload a malicious file containing JavaScript code inside an archive which will execute when a victim visits index.html inside the plugin directory.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Autoptimize # CVE-2021-24377
- CVE, Research URL
- Home page URL
- Application
- Date
- Jun 22, 2021
- Research Description
- The Autoptimize WordPress plugin before 2.7.8 attempts to remove potential malicious files from the extracted archive uploaded via the 'Import Settings' feature, however this is not sufficient to protect against RCE as a race condition can be achieved in between the moment the file is extracted on the disk but not yet removed. It is a bypass of CVE-2020-24948.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Autoptimize # CVE-2023-2113
- CVE, Research URL
- Home page URL
- Application
- Date
- May 30, 2023
- Research Description
- The Autoptimize WordPress plugin before 3.1.7 does not sanitise and escape the settings imported from a previous export, allowing high privileged users (such as an administrator) to inject arbitrary javascript into the admin panel, even when the unfiltered_html capability is disabled, such as in a multisite setup.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Autoptimize # CVE-2021-24376
- CVE, Research URL
- Home page URL
- Application
- Date
- Jun 22, 2021
- Research Description
- The Autoptimize WordPress plugin before 2.7.8 attempts to delete malicious files (such as .php) form the uploaded archive via the "Import Settings" feature, after its extraction. However, the extracted folders are not checked and it is possible to upload a zip which contained a directory with PHP file in it and then it is not removed from the disk. It is a bypass of CVE-2020-24948 which allows sending a PHP file via the "Import Settings" functionality to achieve Remote Code Execution.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Apr 15, 2025
Autoptimize # PSC-2025-64563
- PSC, Research URL
- Home page URL
- Application
- Date
- Apr 15, 2025
- Research Description
- Autoptimize 3.1.13 is a high-performance optimization plugin for WordPress designed to dramatically speed up your website. By aggregating, minifying, and caching JavaScript, CSS, and HTML code, the plugin ensures leaner and faster page loads. It also enhances performance by inlining critical CSS, deferring script execution, and supporting modern image formats like WebP and AVIF. Built with flexibility and extensibility in mind, Autoptimize provides a robust API, enabling developers to fine-tune optimizations based on specific site requirements. With Autoptimize Pro, users can access premium features such as image CDN, page caching, critical CSS automation, and more. Autoptimize has undergone rigorous code review and security testing, achieving the Plugin Security Certification (PSC-2025-64563) from CleanTalk, ensuring peace of mind for site owners and developers who prioritize security.
- Affected versions
-
Min -, max -.
- Status
-
SAFE & CERTIFIED