Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-33634 | The Autoptimize WordPress plugin before 3.1.7 does not sanitise and escape the settings imported from a previous export, allowing high privileged users (such as an administrator) to inject arbitrary javascript into the admin panel, even when the unfiltered_html capability is disabled, such as in a multisite setup. |
Fri, 10 Jan 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2025-01-10T21:05:32.641Z
Reserved: 2023-04-17T09:11:02.125Z
Link: CVE-2023-2113
Updated: 2024-08-02T06:12:20.061Z
Status : Modified
Published: 2023-05-30T08:15:09.900
Modified: 2025-01-10T21:15:11.123
Link: CVE-2023-2113
No data.
OpenCVE Enrichment
No data.
No weakness.
EUVD