Unauthorized Data Loss Vulnerability in RapidLoad Power-Up for Autoptimize Plugin
CVE-2023-1337
Summary
The RapidLoad Power-Up for Autoptimize plugin for WordPress is affected by a vulnerability that allows authenticated attackers with subscriber-level access to perform unauthorized actions. Specifically, there is a missing capability check on the clear_uucss_logs function, which can lead to the deletion of critical plugin log files. This presents a significant risk of data loss for users relying on the plugin for performance optimization.
Affected Version(s)
RapidLoad Power-Up for Autoptimize * <= 1.7.1
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- 🟡
Public PoC available
- 👾
Exploit known to exist
Vulnerability published
Vulnerability Reserved