Plugin Vulnerability Hub
Plugin 12 known issues Latest disclosed Mar 20, 2026

Autoptimize Vulnerabilities

Review known vulnerability records for the WordPress plugin Autoptimize (`autoptimize`), including severity, CVE references, affected versions, and patch status.

Recent tracked CVEs on this page include CVE-2026-2430, CVE-2026-2352 and CVE-2025-13401, so operators can jump from disclosure to patch validation without scanning the full feed first.

Known Records
12
High or Critical
4
Patch Coverage
100%
Last Updated
Mar 20, 2026
Priority CVE Quick Links

Fast paths into Autoptimize CVE reports

Start with the highest-signal CVE records for this WordPress plugin before scanning the full vulnerability feed.

Indexed CVEs
11
Coverage Snapshot

What this page helps you verify fast

This hub clusters every indexed record for Autoptimize so operators can confirm whether a disclosed issue maps to the installed slug, version range, and patch path.

Patch Visibility
12 records include a published patch path, leaving 0 with no listed safe release yet.
Severity Mix
2 critical and 2 high severity findings.
Recent CVEs
CVE-2026-2430, CVE-2026-2352 and CVE-2025-13401
Reference Workflow
Jump from the hub into the full report when you need remediation notes, exploit context, CVSS vectors, or source references.
Triage First

Open the records most likely to drive action

These recent records surface the CVE strings, patch cues, and direct report links most operators need first.

Known Vulnerabilities

Reports for Autoptimize

Sorted by latest disclosure date so newly published issues surface first.

Plugin Medium Patched: Yes CVE-2026-2430
CVE-2026-2430: Autoptimize <= 3.1.14 - Authenticated (Contributor+) Stored Cross-Site Scripting via Lazy-loaded Image Attributes

The Autoptimize plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the lazy-loading image processing in all versions up to, and including, 3.1.14. This is due to the use of an overly permissive regular expression in the `add_lazyload` function that replaces all...

Published
Mar 20, 2026
Patched Release
3.1.15
Affected Versions
Versions up to 3.1.14
Next Step
Update to 3.1.15 or newer if supported.
Plugin Medium Patched: Yes CVE-2026-2352
CVE-2026-2352: Autoptimize <= 3.1.14 - Authenticated (Contributor+) Stored Cross-Site Scripting via 'ao_post_preload' Meta Value

The Autoptimize plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'ao_post_preload' meta value in all versions up to, and including, 3.1.14. This is due to insufficient input sanitization in the `ao_metabox_save()` function and missing output escaping when...

Published
Mar 20, 2026
Patched Release
3.1.15
Affected Versions
Versions up to 3.1.14
Next Step
Update to 3.1.15 or newer if supported.
Plugin Medium Patched: Yes CVE-2025-13401
CVE-2025-13401: Autoptimize <= 3.1.13 - Authenticated (Contributor+) Stored Cross-Site Scripting

The Autoptimize plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the LCP Image to preload metabox in all versions up to, and including, 3.1.13 due to insufficient input sanitization and output escaping on user-supplied image attributes in the "create_img_prel...

Published
Dec 03, 2025
Patched Release
3.1.14
Affected Versions
Versions up to 3.1.13
Next Step
Update to 3.1.14 or newer if supported.
Plugin Medium Patched: Yes CVE-2023-2113
CVE-2023-2113: Autoptimize <= 3.1.6 - Authenticated (Admin+) Stored Cross-Site Scripting via Critical CSS Rules

The Autoptimize plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the critical css rules in versions up to, and including, 3.1.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-...

Published
Apr 25, 2023
Patched Release
3.1.7
Affected Versions
Versions up to 3.1.6
Next Step
Update to 3.1.7 or newer if supported.
Plugin Medium Patched: Yes CVE-2022-4057
CVE-2022-4057: Autoptimize <= 3.0.4 - Sensitive Information Disclosure

The Autoptimize plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 3.0.4 via the 'ao_ccss_export_callback' and 'ao_ccss_import_callback' functions. The settings.json file is not deleted in the import/export callbacks, which coul...

Published
Dec 05, 2022
Patched Release
3.1.0
Affected Versions
Versions up to 3.0.4
Next Step
Update to 3.1.0 or newer if supported.
Plugin Medium Patched: Yes CVE-2022-2635
CVE-2022-2635: Autoptimize <= 3.1.0 - Authenticated (Admin+) Stored Cross-Site Scripting via Critical CSS Settings

The Autoptimize plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the critical css settings rules in versions up to, and including, 3.1.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with admin...

Published
Jul 19, 2022
Patched Release
3.1.1
Affected Versions
Versions up to 3.1.0
Next Step
Update to 3.1.1 or newer if supported.
Plugin Medium Patched: Yes CVE-2021-24332
CVE-2021-24332: Autoptimize <= 2.8.3 - Stored Cross-Site Scripting

The Autoptimize WordPress plugin before 2.8.4 was missing proper escaping and sanitisation in some of its settings, allowing high privilege users to set XSS payloads in them, leading to stored Cross-Site Scripting issues.

Published
May 07, 2021
Patched Release
2.8.4
Affected Versions
Versions before 2.8.4
Next Step
Update to 2.8.4 or newer if supported.
Plugin Medium Patched: Yes CVE-2021-24378
CVE-2021-24378: Autoptimize <= 2.7.7 - Unsafe File Upload to Cross-Site Scripting

The Autoptimize WordPress plugin before 2.7.8 does not check for malicious files such as .html in the archive uploaded via the 'Import Settings' feature. As a result, it is possible for a high privilege user to upload a malicious file containing JavaScript code inside an archive...

Published
Oct 09, 2020
Patched Release
2.7.8
Affected Versions
Versions before 2.7.8
Next Step
Update to 2.7.8 or newer if supported.
Plugin Critical Patched: Yes CVE-2021-24376
CVE-2021-24376: Autoptimize <= 2.7.7 - Arbitrary File Upload (and Remote Code Execution) via Import Settings

The Autoptimize WordPress plugin before 2.7.8 attempts to delete malicious files (such as .php) form the uploaded archive via the "Import Settings" feature, after its extraction. However, the extracted folders are not checked and it is possible to upload a zip which contained a d...

Published
Oct 09, 2020
Patched Release
2.7.8
Affected Versions
Versions before 2.7.8
Next Step
Update to 2.7.8 or newer if supported.
Plugin High Patched: Yes CVE-2021-24377
CVE-2021-24377: Autoptimize <= 2.7.7 - Race Condition leading to Remote Code Execution

The Autoptimize WordPress plugin before 2.7.8 attempts to remove potential malicious files from the extracted archive uploaded via the 'Import Settings' feature, however this is not sufficient to protect against RCE as a race condition can be achieved in between the moment the fi...

Published
Oct 09, 2020
Patched Release
2.7.8
Affected Versions
Versions before 2.7.8
Next Step
Update to 2.7.8 or newer if supported.
Plugin High Patched: Yes CVE-2020-24948
CVE-2020-24948: Autoptimize <= 2.7.6 - Authenticated Arbitrary File Upload

The ao_ccss_import AJAX call in Autoptimize Wordpress Plugin 2.7.6 does not ensure that the file provided is a legitimate Zip file, allowing high privilege users to upload arbitrary files, such as PHP, leading to remote command execution.

Published
Aug 24, 2020
Patched Release
2.7.7
Affected Versions
Versions up to 2.7.6
Next Step
Update to 2.7.7 or newer if supported.
Plugin Critical Patched: Yes
Autoptimize <= 2.1.0 - Unauthenticated Local File Inclusion

The Autoptimize plugin for WordPress is vulnerable to Local File Inclusion in versions up to, and including, 2.1.0. This allows unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used...

Published
Jun 19, 2017
Patched Release
2.1.1
Affected Versions
Versions up to 2.1.0
Next Step
Update to 2.1.1 or newer if supported.