VYPR
High severity8.8NVD Advisory· Published May 18, 2026· Updated May 18, 2026

CVE-2026-3220

CVE-2026-3220

Description

The Autoptimize WordPress plugin before 3.1.15, Clearfy Cache WordPress plugin before 2.4.2, Speed Optimizer WordPress plugin before 7.7.9 are vulnerable to unauthenticated Stored Cross-Site Scripting (XSS) due to a predictable replacement hash used during the HTML minification process and abusing a regular expression. This allows an attacker to inject arbitrary HTML attributes in the final HTML output by anticipating the placeholder format.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Multiple WordPress caching/optimization plugins are vulnerable to unauthenticated stored XSS via predictable hash in HTML minification, allowing arbitrary attribute injection.

Vulnerability

Overview

The Autoptimize (before 3.1.15), Clearfy Cache (before 2.4.2), and Speed Optimizer (before 7.7.9) WordPress plugins are affected by an unauthenticated stored cross-site scripting (XSS) vulnerability. The root cause lies in the HTML minification process: these plugins use a predictable replacement hash for placeholders during minification, and an attacker can abuse a regular expression to inject arbitrary HTML attributes into the final output [1].

Exploitation

An unauthenticated attacker can craft a request containing malicious HTML attributes that, when processed by the minification routine, are inserted into the page's HTML. Because the placeholder format is deterministic, the attacker can anticipate the hash and ensure the injected attributes are rendered in the browser. No authentication or special privileges are required; the attack can be performed via any user-submitted content that passes through the minification pipeline (e.g., comments, posts) [1].

Impact

Successful exploitation allows the attacker to execute arbitrary JavaScript in the context of a victim's browser. This can lead to session hijacking, website defacement, redirection to malicious sites, or theft of sensitive information. Since the XSS is stored, the malicious payload persists and affects all visitors to the affected page [1].

Mitigation

The vendors have released patched versions: Autoptimize 3.1.15, Clearfy Cache 2.4.2, and Speed Optimizer 7.7.9. Users are strongly advised to update immediately. No workaround is documented; updating is the only reliable fix [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.