Unauthorized Data Loss Vulnerability in RapidLoad Power-Up for Autoptimize Plugin
CVE-2023-1337

4.3MEDIUM

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
10 March 2023

Badges

πŸ‘Ύ Exploit Exists🟑 Public PoC

Summary

The RapidLoad Power-Up for Autoptimize plugin for WordPress is affected by a vulnerability that allows authenticated attackers with subscriber-level access to perform unauthorized actions. Specifically, there is a missing capability check on the clear_uucss_logs function, which can lead to the deletion of critical plugin log files. This presents a significant risk of data loss for users relying on the plugin for performance optimization.

Affected Version(s)

RapidLoad Power-Up for Autoptimize * <= 1.7.1

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟑

    Public PoC available

  • πŸ‘Ύ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

Marco Wotschka
.