CVE-2023-1340

4.3 MEDIUM

📋 TL;DR

This CSRF vulnerability in the RapidLoad Power-Up for Autoptimize WordPress plugin allows unauthenticated attackers to trick administrators into clearing plugin logs via malicious links. It affects WordPress sites using vulnerable plugin versions up to 1.7.1. The attack requires social engineering to convince an admin to click a crafted link.

💻 Affected Systems

Products:
  • RapidLoad Power-Up for Autoptimize WordPress plugin
Versions: Up to and including version 1.7.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with vulnerable plugin versions enabled; no special configuration required.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could clear forensic evidence of other attacks, enabling cover-up of more serious compromises and hindering incident investigation.

🟠

Likely Case

Malicious actors clear plugin logs to hide traces of other attacks or disrupt debugging efforts, potentially enabling persistence.

🟢

If Mitigated

With proper CSRF protections, the attack fails, leaving logs intact for security monitoring and incident response.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires social engineering to trick administrators; technical complexity is minimal once malicious link is crafted.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 1.7.2 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/2877726/unusedcss/trunk/includes/modules/unused-css/UnusedCSS_Admin.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'RapidLoad Power-Up for Autoptimize'. 4. Click 'Update Now' if available, or manually update to version 1.7.2+. 5. Verify update completes successfully.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the vulnerable plugin until patched to prevent exploitation.

wp plugin deactivate rapidload-power-up-for-autoptimize

CSRF Protection via .htaccess

linux

Add basic CSRF protections at web server level (limited effectiveness for this specific vulnerability).

# Add to .htaccess:
Header set X-Frame-Options "DENY"
Header set Content-Security-Policy "frame-ancestors 'none'"
# Add to .htaccess:
Header set X-Frame-Options "DENY"
Header set Content-Security-Policy "frame-ancestors 'none'"

🧯 If You Can't Patch

  • Implement strict admin access controls and educate administrators about phishing risks.
  • Monitor and alert on unexpected log clearing activities within the plugin.

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → RapidLoad Power-Up for Autoptimize → Version. If version ≤1.7.1, vulnerable.

Check Version:

wp plugin get rapidload-power-up-for-autoptimize --field=version

Verify Fix Applied:

Confirm plugin version is 1.7.2 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected clearing of RapidLoad/Autoptimize plugin logs without admin intent
  • HTTP requests to admin-ajax.php or similar endpoints with clear_uucss_logs action

Network Indicators:

  • Unusual outbound connections from admin sessions following link clicks

SIEM Query:

source="wordpress" AND action="clear_uucss_logs" AND user_role="administrator"

🔗 References

📤 Share & Export