The Rapid Cache plugin for WordPress is vulnerable to Cache Poisoning in all versions up to, and including, 1.2.3. This is due to plugin storing HTTP headers in the cached data. This makes it possible for unauthenticated attackers to poison the cache with custom HTTP headers that may be unsanitized which can lead to Cross-Site Scripting.
References
Link | Resource |
---|---|
https://wordpress.org/plugins/rapid-cache/ | Product |
https://www.wordfence.com/threat-intel/vulnerabilities/id/72b777ac-1870-4588-82fe-da96a784ec81?source=cve | Third Party Advisory |
Configurations
History
24 Feb 2025, 12:40
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:megaoptim:rapid_cache:*:*:*:*:*:wordpress:*:* | |
References | () https://wordpress.org/plugins/rapid-cache/ - Product | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/72b777ac-1870-4588-82fe-da96a784ec81?source=cve - Third Party Advisory | |
CWE | NVD-CWE-Other | |
First Time |
Megaoptim
Megaoptim rapid Cache |
18 Feb 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
18 Feb 2025, 05:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-18 05:15
Updated : 2025-02-24 12:40
NVD link : CVE-2024-12314
Mitre link : CVE-2024-12314
CVE.ORG link : CVE-2024-12314
JSON object : View
Products Affected
megaoptim
- rapid_cache
CWE