CVE-2023-1333

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker with a subscriber-level account on a WordPress site to delete the cache of the RapidLoad Power-Up for Autoptimize plugin, potentially disrupting site performance. It occurs because the plugin doesn't properly check if the user has permission to perform this action, making it accessible to anyone with a basic account.

Technical Description

The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the clear_page_cache function in versions up to, and including, 1.7.1. This makes it possible for authenticated attackers with subscriber-level access to delete the plugin's cache.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
Confidentiality ImpactNone
Integrity ImpactLow
Availability ImpactNone
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$552($500-$1K)
Vendor Response
Grade FPatched in 1071 days

Quick Information

Published

Mar 10, 2023

almost 3 years ago

Last Modified

Feb 13, 2026

7 days ago

Vendor

rapidload

Product

rapidload power-up for autoptimize