CVE-2023-1333

4.3 MEDIUM

📋 TL;DR

The RapidLoad Power-Up for Autoptimize WordPress plugin has a missing capability check that allows authenticated users with subscriber-level access to delete the plugin's cache. This vulnerability affects all WordPress sites using the plugin up to version 1.7.1, potentially causing performance degradation through cache deletion.

💻 Affected Systems

Products:
  • RapidLoad Power-Up for Autoptimize WordPress plugin
Versions: Up to and including 1.7.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin enabled and at least one subscriber-level user account.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could repeatedly delete cache causing significant performance degradation, potentially leading to denial of service conditions during high traffic periods.

🟠

Likely Case

Malicious users or compromised accounts delete cache, causing temporary performance issues until cache rebuilds.

🟢

If Mitigated

Minimal impact with proper access controls and monitoring in place.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but only at subscriber level, which is the lowest WordPress user role.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.7.2 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/2877726/unusedcss/trunk/includes/modules/unused-css/UnusedCSS_Admin.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find 'RapidLoad Power-Up for Autoptimize'
4. Click 'Update Now' if available
5. Alternatively, download version 1.7.2+ from WordPress repository and manually update

🔧 Temporary Workarounds

Remove vulnerable plugin

all

Temporarily disable or remove the RapidLoad Power-Up for Autoptimize plugin until patched

wp plugin deactivate rapidload-power-up-for-autoptimize
wp plugin delete rapidload-power-up-for-autoptimize

Restrict user registration

all

Disable new user registration to prevent attackers from creating subscriber accounts

🧯 If You Can't Patch

  • Implement strict access controls and monitor for unauthorized cache clearing activities
  • Consider using alternative caching solutions until patch can be applied

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → RapidLoad Power-Up for Autoptimize → Version. If version is 1.7.1 or lower, you are vulnerable.

Check Version:

wp plugin get rapidload-power-up-for-autoptimize --field=version

Verify Fix Applied:

Verify plugin version is 1.7.2 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unusual cache clearing events from subscriber-level users
  • Multiple cache deletion requests from single user accounts

Network Indicators:

  • POST requests to admin-ajax.php with action=clear_page_cache from non-admin users

SIEM Query:

source="wordpress.log" AND "clear_page_cache" AND user_role="subscriber"

🔗 References

📤 Share & Export