The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to unauthorized data loss due to a missing capability check on the clear_uucss_logs function in versions up to, and including, 1.7.1. This makes it possible for authenticated attackers with subscriber-level access to delete plugin log files.
Project Subscriptions
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-23595 | The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to unauthorized data loss due to a missing capability check on the clear_uucss_logs function in versions up to, and including, 1.7.1. This makes it possible for authenticated attackers with subscriber-level access to delete plugin log files. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 20 Feb 2026 20:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rapidload rapidload Power-up For Autoptimize
|
|
| CPEs | cpe:2.3:a:rapidload:rapidload_power-up_for_autoptimize:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Rapidload power-up For Autoptimize
|
Rapidload rapidload Power-up For Autoptimize
|
Mon, 13 Jan 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-01-13T16:58:33.400Z
Reserved: 2023-03-10T18:33:09.782Z
Link: CVE-2023-1337
Updated: 2024-08-02T05:40:59.852Z
Status : Analyzed
Published: 2023-03-10T20:15:10.420
Modified: 2026-02-20T20:35:50.947
Link: CVE-2023-1337
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD