cleantalk
Vulnerabilities and Security Researches

Vulnerabilities and security researches forautoptimize autoptimize

Direction: descending
Apr 15, 2025

Autoptimize # PSC-2025-64563

PSC, Research URL

PSC-2025-64563

Application

Autoptimize

Date
Apr 15, 2025
Research Description
Autoptimize 3.1.13 is a high-performance optimization plugin for WordPress designed to dramatically speed up your website. By aggregating, minifying, and caching JavaScript, CSS, and HTML code, the plugin ensures leaner and faster page loads. It also enhances performance by inlining critical CSS, deferring script execution, and supporting modern image formats like WebP and AVIF. Built with flexibility and extensibility in mind, Autoptimize provides a robust API, enabling developers to fine-tune optimizations based on specific site requirements. With Autoptimize Pro, users can access premium features such as image CDN, page caching, critical CSS automation, and more. Autoptimize has undergone rigorous code review and security testing, achieving the Plugin Security Certification (PSC-2025-64563) from CleanTalk, ensuring peace of mind for site owners and developers who prioritize security.
Affected versions
Min -, max -.
Status
SAFE & CERTIFIED
Jun 07, 2024

Autoptimize # CVE-2021-24332

CVE, Research URL

CVE-2021-24332

Application

Autoptimize

Date
May 24, 2021
Research Description
The Autoptimize WordPress plugin before 2.8.4 was missing proper escaping and sanitisation in some of its settings, allowing high privilege users to set XSS payloads in them, leading to stored Cross-Site Scripting issues
Affected versions
Min -, max -.
Status
vulnerable

Autoptimize # CVE-2020-24948

CVE, Research URL

CVE-2020-24948

Application

Autoptimize

Date
Sep 03, 2020
Research Description
The ao_ccss_import AJAX call in Autoptimize Wordpress Plugin 2.7.6 does not ensure that the file provided is a legitimate Zip file, allowing high privilege users to upload arbitrary files, such as PHP, leading to remote command execution.
Affected versions
Min -, max -.
Status
vulnerable

Autoptimize # CVE-2022-2635

CVE, Research URL

CVE-2022-2635

Application

Autoptimize

Date
Sep 16, 2022
Research Description
The Autoptimize WordPress plugin before 3.1.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
Affected versions
Min -, max -.
Status
vulnerable

Autoptimize # CVE-2022-4057

CVE, Research URL

CVE-2022-4057

Application

Autoptimize

Date
Jan 03, 2023
Research Description
The Autoptimize WordPress plugin before 3.1.0 uses an easily guessable path to store plugin's exported settings and logs.
Affected versions
Min -, max -.
Status
vulnerable

Autoptimize # CVE-2021-24378

CVE, Research URL

CVE-2021-24378

Application

Autoptimize

Date
Jun 22, 2021
Research Description
The Autoptimize WordPress plugin before 2.7.8 does not check for malicious files such as .html in the archive uploaded via the 'Import Settings' feature. As a result, it is possible for a high privilege user to upload a malicious file containing JavaScript code inside an archive which will execute when a victim visits index.html inside the plugin directory.
Affected versions
Min -, max -.
Status
vulnerable

Autoptimize # CVE-2021-24377

CVE, Research URL

CVE-2021-24377

Application

Autoptimize

Date
Jun 22, 2021
Research Description
The Autoptimize WordPress plugin before 2.7.8 attempts to remove potential malicious files from the extracted archive uploaded via the 'Import Settings' feature, however this is not sufficient to protect against RCE as a race condition can be achieved in between the moment the file is extracted on the disk but not yet removed. It is a bypass of CVE-2020-24948.
Affected versions
Min -, max -.
Status
vulnerable

Autoptimize # CVE-2023-2113

CVE, Research URL

CVE-2023-2113

Application

Autoptimize

Date
May 30, 2023
Research Description
The Autoptimize WordPress plugin before 3.1.7 does not sanitise and escape the settings imported from a previous export, allowing high privileged users (such as an administrator) to inject arbitrary javascript into the admin panel, even when the unfiltered_html capability is disabled, such as in a multisite setup.
Affected versions
Min -, max -.
Status
vulnerable

Autoptimize # CVE-2021-24376

CVE, Research URL

CVE-2021-24376

Application

Autoptimize

Date
Jun 22, 2021
Research Description
The Autoptimize WordPress plugin before 2.7.8 attempts to delete malicious files (such as .php) form the uploaded archive via the "Import Settings" feature, after its extraction. However, the extracted folders are not checked and it is possible to upload a zip which contained a directory with PHP file in it and then it is not removed from the disk. It is a bypass of CVE-2020-24948 which allows sending a PHP file via the "Import Settings" functionality to achieve Remote Code Execution.
Affected versions
Min -, max -.
Status
vulnerable