Description
WordPress Plugin Autoptimize is prone to multiple vulnerabilities, including cross-site scripting and arbitrary file upload vulnerabilities. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, allowing the attacker to steal cookie-based authentication credentials or launch other attacks, or to upload arbitrary code and run it in the context of the webserver process, which may facilitate unauthorized access or privilege escalation. WordPress Plugin Autoptimize version 2.7.6 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 2.7.7 or latest
References
https://www.exploit-db.com/exploits/48770
https://packetstormsecurity.com/files/158996/WordPress-Autoptimize-2.7.6-Shell-Upload.html
https://www.exploit-db.com/exploits/49399
https://packetstormsecurity.com/files/160850/WordPress-Autoptimize-Shell-Upload.html
https://plugins.svn.wordpress.org/autoptimize/trunk/readme.txt
Related Vulnerabilities
WordPress Plugin WP-Board SQL Injection (1.1)
Drupal Core 4.7.x Cross-Site Scripting (4.7.0 - 4.7.4)
WordPress Plugin HashBar-WordPress Notification Bar Cross-Site Scripting (1.3.5)
WordPress Plugin eID Easy Cross-Site Scripting (4.6)
WordPress Plugin YITH WooCommerce Multi-step Checkout Security Bypass (1.7.4)