Unauthorized Data Loss Vulnerability in RapidLoad Power-Up for Autoptimize Plugin
CVE-2023-1337
Key Information:
- Vendor
- Wordpress
- Vendor
- CVE Published:
- 10 March 2023
Badges
Summary
The RapidLoad Power-Up for Autoptimize plugin for WordPress is affected by a vulnerability that allows authenticated attackers with subscriber-level access to perform unauthorized actions. Specifically, there is a missing capability check on the clear_uucss_logs function, which can lead to the deletion of critical plugin log files. This presents a significant risk of data loss for users relying on the plugin for performance optimization.
Affected Version(s)
RapidLoad Power-Up for Autoptimize * <= 1.7.1
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved