id: CVE-2022-4057 info: name: Autoptimize < 3.1.0 - Information Disclosure author: DhiyaneshDK severity: medium description: | The Autoptimize WordPress plugin before 3.1.0 uses an easily guessable path to store plugin's exported settings and logs. remediation: | Upgrade to Autoptimize version 3.1.0 or later to fix the information disclosure vulnerability. reference: - https://wpscan.com/vulnerability/95ee1b9c-1971-4c35-8527-5764e9ed64af - https://wordpress.org/plugins/autoptimize/ - https://nvd.nist.gov/vuln/detail/CVE-2022-4057 classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N cvss-score: 5.3 cve-id: CVE-2022-4057 cwe-id: CWE-425 epss-score: 0.00196 epss-percentile: 0.57317 cpe: cpe:2.3:a:optimizingmatters:autooptimize:*:*:*:*:*:wordpress:*:* metadata: verified: true max-request: 2 vendor: optimizingmatters product: autooptimize framework: wordpress publicwww-query: /wp-content/plugins/autoptimize tags: wpscan,cve,cve2023,wp,wordpress,wp-plugin,disclosure,autoptimize,optimizingmatters http: - method: GET path: - "{{BaseURL}}/wp-content/uploads/ao_ccss/queuelog.html" - "{{BaseURL}}/blog/wp-content/uploads/ao_ccss/queuelog.html" stop-at-first-match: true matchers-condition: and matchers: - type: word part: body words: - 'Job id <' - 'log messages' condition: and - type: status status: - 200 # digest: 4a0a00473045022100d78b128eb2584248c748a95eb9c990fb5f72089c16feb5c317221d10608daad4022066ab0c5000357fdb5d5599eeb0840e328daad02a59bd8a72f9ba265d9ebec90f:922c64590222798bb761d5b6d8e72950