Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
RapidLoad Power-Up for Autoptimize <= 1.7.1 - Cross-Site Request Forgery
Vulnerability Description
The RapidLoad Power-Up for Autoptimize plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.7.1. This is due to missing or incorrect nonce validation on its AJAX actions. This makes it possible for unauthenticated attackers to invoke those functions, via forged request granted they can trick a site administrator into performing an action such as clicking on a link. Actions include resetting the API key, accessing or deleting log files, and deleting cache among others.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L
Vulnerability Type
跨站请求伪造(CSRF)
Vulnerability Title
WordPress plugin RapidLoad Power-Up for Autoptimize 跨站请求伪造漏洞
Vulnerability Description
WordPress和WordPress plugin都是WordPress基金会的产品。WordPress是一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WordPress plugin是一个应用插件。 WordPress plugin RapidLoad Power-Up for Autoptimize 1.7.1及之前版本存在跨站请求伪造漏洞,该漏洞源于对AJAX操作缺少或不正确的随机数验证,存在操作跨站请求伪造漏洞,未经身份验证的攻击者利用该漏洞可以重置
CVSS Information
N/A
Vulnerability Type
N/A