{"id":"CVE-2023-40600","details":"Exposure of Sensitive Information to an Unauthorized Actor vulnerability in Exactly WWW EWWW Image Optimizer. It works only when debug.log is turned on.This issue affects EWWW Image Optimizer: from n/a through 7.2.0.\n\n","modified":"2026-03-14T12:17:06.100134Z","published":"2023-11-30T15:15:07.973Z","references":[{"type":"ADVISORY","url":"https://patchstack.com/database/vulnerability/ewww-image-optimizer/wordpress-ewww-image-optimizer-plugin-7-2-0-sensitive-data-exposure-vulnerability?_s_id=cve"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/nosilver4u/ewww-image-optimizer","events":[{"introduced":"0"},{"fixed":"bee242e02d66da3fc774aa62b0ed251cea461edb"}],"database_specific":{"versions":[{"introduced":"0"},{"fixed":"7.2.1"}]}}],"versions":["v3.3.0","v3.3.1","v3.4.1","v3.5.0","v4.0.0","v4.0.3","v4.0.6","v4.2.2","v4.3.1","v4.3.2","v4.4.0","v4.4.1","v4.4.2","v4.5.0","v4.5.1","v4.5.2","v4.5.3","v4.6.0","v4.6.1","v4.6.2","v4.6.3","v4.7.0","v4.7.1","v4.7.2","v4.7.3","v4.7.4","v4.8.0","v4.8.1","v4.9.0","v4.9.1","v4.9.2","v4.9.3","v5.0.0","v5.1.0","v5.1.2","v5.1.3","v5.2.0","v5.2.2","v5.2.3","v5.2.4","v5.3.1","v5.3.2","v5.4.0","v5.4.1","v5.6.0","v5.6.1","v5.7.0","v5.8.0","v5.8.2","v6.0.0","v6.0.1","v6.0.2","v6.1.0","v6.1.1","v6.1.2","v6.1.3","v6.1.4","v6.1.5","v6.1.6","v6.1.7","v6.1.8","v6.1.9","v6.2.0","v6.2.1","v6.2.2","v6.2.3","v6.2.4","v6.2.5","v6.4.0","v6.4.1","v6.4.2","v6.5.0","v6.5.1","v6.5.2","v6.6.0","v6.7.0","v6.8.0","v6.9.0","v6.9.1","v6.9.2","v6.9.3","v7.0.0","v7.0.1","v7.0.2","v7.1.0","v7.2.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2023-40600.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N"}]}