Vulnerability Description
The Autoptimize WordPress plugin before 2.7.8 attempts to remove potential malicious files from the extracted archive uploaded via the 'Import Settings' feature, however this is not sufficient to protect against RCE as a race condition can be achieved in between the moment the file is extracted on the disk but not yet removed. It is a bypass of CVE-2020-24948.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Autoptimize | Autoptimize | < 2.7.8 |
Related Weaknesses (CWE)
References
- https://wpscan.com/vulnerability/85c0a564-2e56-413d-bc3a-1039343207e4ExploitThird Party Advisory
- https://wpscan.com/vulnerability/85c0a564-2e56-413d-bc3a-1039343207e4ExploitThird Party Advisory
FAQ
What is CVE-2021-24377?
CVE-2021-24377 is a vulnerability with a CVSS score of 8.1 (HIGH). The Autoptimize WordPress plugin before 2.7.8 attempts to remove potential malicious files from the extracted archive uploaded via the 'Import Settings' feature, however this is not sufficient to prot...
How severe is CVE-2021-24377?
CVE-2021-24377 has been rated HIGH with a CVSS base score of 8.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-24377?
Check the references section above for vendor advisories and patch information. Affected products include: Autoptimize Autoptimize.