The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the clear_page_cache function in versions up to, and including, 1.7.1. This makes it possible for authenticated attackers with subscriber-level access to delete the plugin's cache.
Metrics
Affected Vendors & Products
References
History
Fri, 13 Feb 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rapidload rapidload Power-up For Autoptimize
|
|
| Weaknesses | CWE-862 | |
| CPEs | cpe:2.3:a:rapidload:rapidload_power-up_for_autoptimize:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Rapidload power-up For Autoptimize
|
Rapidload rapidload Power-up For Autoptimize
|
Mon, 13 Jan 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Wordfence
Published: 2023-03-10T19:02:13.023Z
Updated: 2025-01-13T17:00:29.847Z
Reserved: 2023-03-10T18:25:30.033Z
Link: CVE-2023-1333
Updated: 2024-08-02T05:41:00.072Z
Status : Analyzed
Published: 2023-03-10T20:15:10.060
Modified: 2026-02-13T21:44:17.270
Link: CVE-2023-1333
No data.