CVE-2023-1344

4.3 MEDIUM

📋 TL;DR

This CSRF vulnerability in the RapidLoad Power-Up for Autoptimize WordPress plugin allows unauthenticated attackers to modify the plugin's cache by tricking administrators into clicking malicious links. It affects WordPress sites using the plugin up to version 1.7.1. The vulnerability stems from missing nonce validation in the uucss_update_rule function.

💻 Affected Systems

Products:
  • RapidLoad Power-Up for Autoptimize WordPress plugin
Versions: Up to and including 1.7.1
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with the vulnerable plugin enabled. The plugin must be actively used for caching.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could poison the plugin's cache with malicious content, potentially leading to site defacement, credential theft via fake login forms, or distribution of malware to visitors.

🟠

Likely Case

Attackers modify cache rules to disrupt site functionality, inject ads, or redirect users to malicious sites, causing reputation damage and potential data loss.

🟢

If Mitigated

With proper CSRF protections and user awareness, successful exploitation requires social engineering and administrator interaction, reducing impact to minimal site disruption.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires social engineering to trick administrators into clicking malicious links. No authentication needed for the CSRF attack itself.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.7.2 or later

Vendor Advisory: https://plugins.trac.wordpress.org/changeset/2877726/unusedcss/trunk/includes/modules/unused-css/UnusedCSS_Admin.php

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'RapidLoad Power-Up for Autoptimize'. 4. Click 'Update Now' if available, or manually update to version 1.7.2+. 5. Verify update completes successfully.

🔧 Temporary Workarounds

Disable Plugin

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate rapidload-power-up-for-autoptimize

Add CSRF Protection

all

Implement custom nonce validation for the affected function

Add wp_verify_nonce() check before uucss_update_rule function execution

🧯 If You Can't Patch

  • Implement web application firewall (WAF) rules to block CSRF attempts targeting the vulnerable endpoint
  • Educate administrators about phishing risks and implement strict click policies

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin > Plugins > Installed Plugins for RapidLoad Power-Up for Autoptimize version 1.7.1 or earlier

Check Version:

wp plugin get rapidload-power-up-for-autoptimize --field=version

Verify Fix Applied:

Verify plugin version is 1.7.2 or later in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unusual POST requests to /wp-admin/admin-ajax.php with action=uucss_update_rule
  • Multiple failed nonce validation attempts in WordPress debug logs

Network Indicators:

  • CSRF payloads in HTTP requests containing uucss_update_rule parameters
  • Unusual traffic patterns to admin-ajax.php from unexpected sources

SIEM Query:

source="wordpress.log" AND "uucss_update_rule" AND NOT "nonce_verified"

🔗 References

📤 Share & Export