CVE-2023-1346
Plain English Summary
AI-powered analysis for quick understanding
An attacker can trick a site administrator into clicking a link that clears the cache of the RapidLoad Power-Up for Autoptimize plugin, potentially disrupting the website's performance. This vulnerability affects versions up to 1.7.1 and requires no special access, just the ability to deceive the admin into taking the action.
Technical Description
The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.1. This is due to missing or incorrect nonce validation on the clear_page_cache function. This makes it possible for unauthenticated attackers to clear the plugin's cache via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Mar 10, 2023
almost 3 years ago
Last Modified
Feb 13, 2026
7 days ago
Vendor
rapidload
Product
rapidload power-up for autoptimize