Vulnerability Description
The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to unauthorized cache modification due to a missing capability check on the attach_rule function in versions up to, and including, 1.7.1. This makes it possible for authenticated attackers with subscriber-level access to modify cache rules.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rapidload | Rapidload Power-Up For Autoptimize | <= 1.7.1 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/changeset/2877726/unusedcss/trunk/includes/moPatch
- https://www.wordfence.com/threat-intel/vulnerabilities/id/1bb55b22-a0d0-424f-8e4
- https://plugins.trac.wordpress.org/changeset/2877726/unusedcss/trunk/includes/moPatch
- https://www.wordfence.com/threat-intel/vulnerabilities/id/1bb55b22-a0d0-424f-8e4Third Party Advisory
FAQ
What is CVE-2023-1338?
CVE-2023-1338 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to unauthorized cache modification due to a missing capability check on the attach_rule function in versions up to, and includ...
How severe is CVE-2023-1338?
CVE-2023-1338 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-1338?
Check the references section above for vendor advisories and patch information. Affected products include: Rapidload Rapidload Power-Up For Autoptimize.