Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-23593 | The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to unauthorized plugin settings update due to a missing capability check on the ucss_connect function in versions up to, and including, 1.7.1. This makes it possible for authenticated attackers with subscriber-level access to connect a new license key to the site. |
Wed, 08 Apr 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | RapidLoad Power-Up for Autoptimize <= 1.7.1 - Missing Authorization in 'ucss_connect' | |
| References |
|
Fri, 20 Feb 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rapidload rapidload Power-up For Autoptimize
|
|
| Weaknesses | CWE-862 | |
| CPEs | cpe:2.3:a:rapidload:rapidload_power-up_for_autoptimize:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Rapidload power-up For Autoptimize
|
Rapidload rapidload Power-up For Autoptimize
|
Mon, 13 Jan 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:31:14.474Z
Reserved: 2023-03-10T18:32:08.650Z
Link: CVE-2023-1335
Updated: 2024-08-02T05:40:59.912Z
Status : Modified
Published: 2023-03-10T20:15:10.247
Modified: 2026-04-08T19:18:05.300
Link: CVE-2023-1335
No data.
OpenCVE Enrichment
No data.
EUVD