PT-2026-26713 · Optimizingmatters · Autoptimize
Matthew Rollings
·
Published
2026-03-20
·
Updated
2026-03-21
·
CVE-2026-2430
CVSS v3.1
6.4
Medium
| AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N |
The Autoptimize plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the lazy-loading image processing in all versions up to, and including, 3.1.14. This is due to the use of an overly permissive regular expression in the
add lazyload function that replaces all occurrences of ssrc= in image tags without limiting to the actual attribute. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page by crafting an image tag where the src URL contains a space followed by src=, causing the regex to break the HTML structure and promote text inside attribute values into executable HTML attributes.Fix
XSS
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Autoptimize