Unauthorized Plugin Settings Update in RapidLoad Power-Up for Autoptimize by WordPress
CVE-2023-1335
4.3MEDIUM
Key Information:
- Vendor
- Wordpress
- Vendor
- CVE Published:
- 10 March 2023
Summary
The RapidLoad Power-Up for Autoptimize plugin for WordPress has a security flaw that allows unauthorized users to update plugin settings because of a missing capability check in the ucss_connect function. This vulnerability affects version 1.7.1 and earlier, enabling attackers with at least subscriber-level access to connect a new license key to the site, potentially leading to unauthorized changes and access.
Affected Version(s)
RapidLoad Power-Up for Autoptimize * <= 1.7.1
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Marco Wotschka