Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-23595 | The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to unauthorized data loss due to a missing capability check on the clear_uucss_logs function in versions up to, and including, 1.7.1. This makes it possible for authenticated attackers with subscriber-level access to delete plugin log files. |
Wed, 08 Apr 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | RapidLoad Power-Up for Autoptimize <= 1.7.1 - Missing Authorization in 'clear_uucss_logs' | |
| References |
|
Fri, 20 Feb 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rapidload rapidload Power-up For Autoptimize
|
|
| CPEs | cpe:2.3:a:rapidload:rapidload_power-up_for_autoptimize:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Rapidload power-up For Autoptimize
|
Rapidload rapidload Power-up For Autoptimize
|
Mon, 13 Jan 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:13:12.710Z
Reserved: 2023-03-10T18:33:09.782Z
Link: CVE-2023-1337
Updated: 2024-08-02T05:40:59.852Z
Status : Modified
Published: 2023-03-10T20:15:10.420
Modified: 2026-04-08T19:18:05.677
Link: CVE-2023-1337
No data.
OpenCVE Enrichment
No data.
EUVD