[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$flGLUUpiizLHuNf-g3Jr5ltCm1wLoBM1ogBoXnPfVIJs":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2022-4057","autoptimize-sensitive-information-disclosure","Autoptimize \u003C= 3.0.4 - Sensitive Information Disclosure","The Autoptimize plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 3.0.4 via the 'ao_ccss_export_callback' and 'ao_ccss_import_callback' functions. The settings.json file is not deleted in the import\u002Fexport callbacks, which could lead to the settings options being leaked.  This can allow unauthenticated attackers to extract sensitive data about the plugin's settings.","autoptimize",null,"\u003C=3.0.4","3.1.0","medium",5.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:L\u002FI:N\u002FA:N","Exposure of Sensitive Information to an Unauthorized Actor","2022-12-05 00:00:00","2024-01-22 19:56:02",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F5f9d237c-110e-4e71-9d2c-db99358468e6?source=api-prod",414]