
Cloud Vulnerability DB
A community-led vulnerabilities database
The vulnerability (CVE-2021-24377) affects the Autoptimize WordPress plugin versions below 2.7.8. It was discovered on October 9, 2020, and involves a race condition vulnerability that could lead to Remote Code Execution (RCE). This vulnerability serves as a bypass of a previously identified issue (CVE-2020-24948) (WPScan).
The vulnerability exists in the 'Import Settings' feature of the Autoptimize plugin. While the plugin attempts to remove potentially malicious files from extracted archives, a race condition can be achieved between the moment a file is extracted to disk and its removal. The CVSS score for this vulnerability is 9.1 (Critical), and it is classified under CWE-94 (WPScan).
If successfully exploited, this vulnerability allows for Remote Code Execution (RCE) on the affected WordPress installations. This could potentially give attackers the ability to execute arbitrary code on the target system (WPScan).
The vulnerability has been fixed in Autoptimize version 2.7.8. Users are strongly advised to update their Autoptimize plugin to this version or later to mitigate the risk (WPScan).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."