CVE-2023-1333
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker with a subscriber-level account on a WordPress site to delete the cache of the RapidLoad Power-Up for Autoptimize plugin, potentially disrupting site performance. It occurs because the plugin doesn't properly check if the user has permission to perform this action, making it accessible to anyone with a basic account.
Technical Description
The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the clear_page_cache function in versions up to, and including, 1.7.1. This makes it possible for authenticated attackers with subscriber-level access to delete the plugin's cache.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 10, 2023
almost 3 years ago
Last Modified
Feb 13, 2026
7 days ago
Vendor
rapidload
Product
rapidload power-up for autoptimize