The RapidLoad – Optimize Web Vitals Automatically plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ajax_deactivate() function in all versions up to, and including, 2.4.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to reset some of the plugin's settings.
References
Configurations
Configuration 1 (hide)
|
History
21 Feb 2025, 15:55
Type | Values Removed | Values Added |
---|---|---|
First Time |
Rapidload
Rapidload rapidload Power-up For Autoptimize |
|
Summary |
|
|
References | () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3232560%40unusedcss&new=3232560%40unusedcss&sfp_email=&sfph_mail= - Patch | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/87f9f052-2963-4548-9ff8-91dc2b4ecb43?source=cve - Third Party Advisory | |
CPE | cpe:2.3:a:rapidload:rapidload_power-up_for_autoptimize:*:*:*:*:*:wordpress:*:* |
01 Feb 2025, 04:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-01 04:15
Updated : 2025-02-21 15:55
NVD link : CVE-2024-13651
Mitre link : CVE-2024-13651
CVE.ORG link : CVE-2024-13651
JSON object : View
Products Affected
rapidload
- rapidload_power-up_for_autoptimize
CWE
CWE-862
Missing Authorization