The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to unauthorized data loss
Reporter | Title | Published | Views | Family All 8 |
---|---|---|---|---|
Prion | Design/Logic Flaw | 10 Mar 202320:15 | – | prion |
Vulnrichment | CVE-2023-1337 | 10 Mar 202319:20 | – | vulnrichment |
NVD | CVE-2023-1337 | 10 Mar 202320:15 | – | nvd |
Cvelist | CVE-2023-1337 | 10 Mar 202319:20 | – | cvelist |
GithubExploit | Exploit for Missing Authorization in Rapidload Power-Up For Autoptimize | 19 Dec 202313:01 | – | githubexploit |
WPVulnDB | RapidLoad Power-Up for Autoptimize < 1.7.2 - Unauthorised AJAX Calls | 10 Mar 202300:00 | – | wpvulndb |
WPVulnDB | RapidLoad Power-Up for Autoptimize < 1.7.2 - Multiple Subscriber+ Unauthorised AJAX Calls | 10 Mar 202300:00 | – | wpvulndb |
Wordfence Blog | Wordfence Intelligence Weekly WordPress Vulnerability Report (Mar 6, 2023 to Mar 12, 2023) | 16 Mar 202313:53 | – | wordfence |
[
{
"vendor": "shakee93",
"product": "RapidLoad Power-Up for Autoptimize",
"versions": [
{
"version": "*",
"status": "affected",
"lessThanOrEqual": "1.7.1",
"versionType": "semver"
}
],
"defaultStatus": "unaffected"
}
]
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo