id: CVE-2022-4057 info: name: Autoptimize < 3.1.0 - Information Disclosure author: DhiyaneshDK severity: medium description: | The Autoptimize WordPress plugin before 3.1.0 uses an easily guessable path to store plugin's exported settings and logs. remediation: | Upgrade to Autoptimize version 3.1.0 or later to fix the information disclosure vulnerability. reference: - https://wpscan.com/vulnerability/95ee1b9c-1971-4c35-8527-5764e9ed64af - https://wordpress.org/plugins/autoptimize/ - https://nvd.nist.gov/vuln/detail/CVE-2022-4057 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cve-id: CVE-2022-4057 cwe-id: CWE-425 epss-score: 0.00177 epss-percentile: 0.54714 cpe: cpe:2.3:a:optimizingmatters:autooptimize:*:*:*:*:*:wordpress:*:* metadata: verified: true max-request: 2 vendor: optimizingmatters product: autooptimize framework: wordpress publicwww-query: /wp-content/plugins/autoptimize tags: wpscan,cve,cve2023,wp,wordpress,wp-plugin,disclosure,autoptimize http: - method: GET path: - "{{BaseURL}}/wp-content/uploads/ao_ccss/queuelog.html" - "{{BaseURL}}/blog/wp-content/uploads/ao_ccss/queuelog.html" stop-at-first-match: true matchers-condition: and matchers: - type: word part: body words: - 'Job id <' - 'log messages' condition: and - type: status status: - 200 # digest: 4a0a00473045022100aafb93ae7ea28b006a006087b59e6615ed9c70f3a7268c2bad08c585f4afc8bf02205812a26605f04500f69a1c736f8b42eedf359ff64d8248d199712a4b2fd06ea9:922c64590222798bb761d5b6d8e72950