CVE-2023-1346

Plain English Summary

AI-powered analysis for quick understanding

An attacker can trick a site administrator into clicking a link that clears the cache of the RapidLoad Power-Up for Autoptimize plugin, potentially disrupting the website's performance. This vulnerability affects versions up to 1.7.1 and requires no special access, just the ability to deceive the admin into taking the action.

Technical Description

The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.1. This is due to missing or incorrect nonce validation on the clear_page_cache function. This makes it possible for unauthenticated attackers to clear the plugin's cache via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionRequired
Confidentiality ImpactNone
Integrity ImpactLow
Availability ImpactNone
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References