Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-23596 | The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to unauthorized cache modification due to a missing capability check on the attach_rule function in versions up to, and including, 1.7.1. This makes it possible for authenticated attackers with subscriber-level access to modify cache rules. |
Wed, 08 Apr 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | RapidLoad Power-Up for Autoptimize <= 1.7.1 - Missing Authorization in 'attach_rule' | |
| References |
|
Fri, 20 Feb 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rapidload rapidload Power-up For Autoptimize
|
|
| Weaknesses | CWE-862 | |
| CPEs | cpe:2.3:a:rapidload:rapidload_power-up_for_autoptimize:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Rapidload power-up For Autoptimize
|
Rapidload rapidload Power-up For Autoptimize
|
Mon, 13 Jan 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T16:38:18.462Z
Reserved: 2023-03-10T18:33:24.935Z
Link: CVE-2023-1338
Updated: 2024-08-02T05:41:00.276Z
Status : Modified
Published: 2023-03-10T20:15:10.503
Modified: 2026-04-08T17:16:52.360
Link: CVE-2023-1338
No data.
OpenCVE Enrichment
No data.
EUVD