Cross-Site Request Forgery in RapidLoad Power-Up for Autoptimize Plugin by WordPress
CVE-2023-1343
4.3MEDIUM
Key Information:
- Vendor
- Wordpress
- Vendor
- CVE Published:
- 10 March 2023
Summary
The RapidLoad Power-Up for Autoptimize plugin for WordPress is susceptible to Cross-Site Request Forgery (CSRF) due to inadequate nonce validation in the attach_rule function. This vulnerability allows unauthenticated attackers to manipulate the plugin's cache if they can trick a legitimate administrator into executing an action, such as clicking a malicious link. This lack of proper validation can lead to unauthorized actions being performed on behalf of the user, potentially compromising site integrity and functionality.
Affected Version(s)
RapidLoad Power-Up for Autoptimize * <= 1.7.1
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Marco Wotschka