Rapidload Vulnerabilities
Comprehensive security vulnerability database for Rapidload products
2
0
2
0
Severity Distribution
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2023-1346 | 4.3 | An attacker can trick a site administrator into clicking a link that clears the cache of the RapidLoad Power-Up for Autoptimize plugin, potentially disrupting the website's performance. This vulnerability affects versions up to 1.7.1 and requires no special access, just the ability to deceive the admin into taking the action. | rapidloadrapidload power-up for autoptimize | Exploit Available | almost 3 years agoMar 10, 2023 |
| CVE-2023-1333 | 4.3 | This vulnerability allows an attacker with a subscriber-level account on a WordPress site to delete the cache of the RapidLoad Power-Up for Autoptimize plugin, potentially disrupting site performance. It occurs because the plugin doesn't properly check if the user has permission to perform this action, making it accessible to anyone with a basic account. | rapidloadrapidload power-up for autoptimize | Exploit Available | almost 3 years agoMar 10, 2023 |
About Rapidload Security
This page tracks all publicly disclosed security vulnerabilities (CVEs) affecting Rapidload products. Our database is updated in real-time from the National Vulnerability Database (NVD) and enriched with exploit information from GitHub and other security research sources.
Each CVE listing includes CVSS severity scores, exploit availability status, AI-powered vulnerability summaries, and links to official patches and security advisories.