Vulnerability Description
The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to unauthorized settings update due to a missing capability check on the uucss_update_rule function in versions up to, and including, 1.7.1. This makes it possible for authenticated attackers with subscriber-level access to update caching rules.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Rapidload | Rapidload Power-Up For Autoptimize | <= 1.7.1 |
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/changeset/2877726/unusedcss/trunk/includes/moPatch
- https://www.wordfence.com/threat-intel/vulnerabilities/id/19f126f8-1d59-44b5-8e0
- https://plugins.trac.wordpress.org/changeset/2877726/unusedcss/trunk/includes/moPatch
- https://www.wordfence.com/threat-intel/vulnerabilities/id/19f126f8-1d59-44b5-8e0Third Party Advisory
FAQ
What is CVE-2023-1339?
CVE-2023-1339 is a vulnerability with a CVSS score of 4.3 (MEDIUM). The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to unauthorized settings update due to a missing capability check on the uucss_update_rule function in versions up to, and inc...
How severe is CVE-2023-1339?
CVE-2023-1339 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-1339?
Check the references section above for vendor advisories and patch information. Affected products include: Rapidload Rapidload Power-Up For Autoptimize.