CVE-2024-12314

The Rapid Cache plugin for WordPress is vulnerable to Cache Poisoning in all versions up to, and including, 1.2.3. This is due to plugin storing HTTP headers in the cached data. This makes it possible for unauthenticated attackers to poison the cache with custom HTTP headers that may be unsanitized which can lead to Cross-Site Scripting.
Configurations

Configuration 1 (hide)

cpe:2.3:a:megaoptim:rapid_cache:*:*:*:*:*:wordpress:*:*

History

24 Feb 2025, 12:40

Type Values Removed Values Added
CPE cpe:2.3:a:megaoptim:rapid_cache:*:*:*:*:*:wordpress:*:*
References () https://wordpress.org/plugins/rapid-cache/ - () https://wordpress.org/plugins/rapid-cache/ - Product
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/72b777ac-1870-4588-82fe-da96a784ec81?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/72b777ac-1870-4588-82fe-da96a784ec81?source=cve - Third Party Advisory
CWE NVD-CWE-Other
First Time Megaoptim
Megaoptim rapid Cache

18 Feb 2025, 15:15

Type Values Removed Values Added
Summary
  • (es) El complemento Rapid Cache para WordPress es vulnerable al envenenamiento de caché en todas las versiones hasta 1.2.3 incluida. Esto se debe al complemento que almacena los encabezados HTTP en los datos en caché. Esto hace posible que los atacantes no autenticados envenenen el caché con encabezados HTTP personalizados que pueden ser no depurados, lo que puede conducir a Cross-Site Scripting.

18 Feb 2025, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-18 05:15

Updated : 2025-02-24 12:40


NVD link : CVE-2024-12314

Mitre link : CVE-2024-12314

CVE.ORG link : CVE-2024-12314


JSON object : View

Products Affected

megaoptim

  • rapid_cache
CWE
CWE-524

Use of Cache Containing Sensitive Information

NVD-CWE-Other