Description
The Autoptimize WordPress plugin before 3.1.15, Clearfy Cache WordPress plugin before 2.4.2, Speed Optimizer WordPress plugin before 7.7.9 are vulnerable to unauthenticated Stored Cross-Site Scripting (XSS) due to a predictable replacement hash used during the HTML minification process and abusing a regular expression. This allows an attacker to inject arbitrary HTML attributes in the final HTML output by anticipating the placeholder format.
Published: 2026-05-18
Score: n/a
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability exists in the Autoptimize, Clearfy Cache, and Speed Optimizer WordPress plugins where the minification routine uses a predictable replacement hash and a poorly constructed regular expression. This flaw permits an attacker to inject arbitrary HTML attributes into the final page output, resulting in a stored cross‑site scripting (XSS) flaw that can persistently affect every visitor to the site. The injected content is rendered in the context of the user’s browser, enabling potential session hijacking, credential theft, or manipulation of site appearance. The weakness is classified as CWE‑79.

Affected Systems

WordPress installations that employ Autoptimize versions earlier than 3.1.15, Clearfy Cache earlier than 2.4.2, or Speed Optimizer earlier than 7.7.9 are susceptible. These third‑party plugins are widely distributed through the WordPress ecosystem and are commonly found on both personal blogs and corporate sites, so the potential impact span could be broad.

Risk and Exploitability

The flaw can be triggered without authentication, as any unauthenticated input that comes through the minification process—such as plugin configuration fields or comment submissions—may be exploited. No official exploit has yet been published and the EPSS score is not available, but the simplicity of injecting markup suggests that attackers could craft manual or automated payloads quickly. Because the XSS is stored, every site visitor becomes a potential victim. Although the vulnerability is not listed in the CISA KEV catalog, the lack of an EPSS score does not negate the risk of widespread exploitation by determined adversaries.

Generated by OpenCVE AI on May 18, 2026 at 07:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Autoptimize to version 3.1.15 or newer
  • Update Clearfy Cache to version 2.4.2 or newer
  • Update Speed Optimizer to version 7.7.9 or newer
  • If an update is not immediately available, temporarily disable the HTML minification feature or remove the vulnerable plugins from the site
  • Implement a content security policy that blocks inline scripts and restricts attribute injection

Generated by OpenCVE AI on May 18, 2026 at 07:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 18 May 2026 11:15:00 +0000

Type Values Removed Values Added
First Time appeared Autoptimize
Autoptimize autoptimize
Clearfy Cache
Clearfy Cache clearfy Cache
Speed Optimizer
Speed Optimizer speed Optimizer
Wordpress
Wordpress wordpress
Vendors & Products Autoptimize
Autoptimize autoptimize
Clearfy Cache
Clearfy Cache clearfy Cache
Speed Optimizer
Speed Optimizer speed Optimizer
Wordpress
Wordpress wordpress

Mon, 18 May 2026 08:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79

Mon, 18 May 2026 06:30:00 +0000

Type Values Removed Values Added
Description The Autoptimize WordPress plugin before 3.1.15, Clearfy Cache WordPress plugin before 2.4.2, Speed Optimizer WordPress plugin before 7.7.9 are vulnerable to unauthenticated Stored Cross-Site Scripting (XSS) due to a predictable replacement hash used during the HTML minification process and abusing a regular expression. This allows an attacker to inject arbitrary HTML attributes in the final HTML output by anticipating the placeholder format.
Title Multiple Plugins - Unauthenticated Stored XSS via Minify Library
References

Subscriptions

Autoptimize Autoptimize
Clearfy Cache Clearfy Cache
Speed Optimizer Speed Optimizer
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published:

Updated: 2026-05-18T06:00:08.130Z

Reserved: 2026-02-25T18:04:15.464Z

Link: CVE-2026-3220

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-18T07:16:12.270

Modified: 2026-05-18T07:16:12.270

Link: CVE-2026-3220

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-18T10:48:54Z

Weaknesses