The Rapid Cache plugin for WordPress is vulnerable to Cache Poisoning in all versions up to, and including, 1.2.3. This is due to plugin storing HTTP headers in the cached data. This makes it possible for unauthenticated attackers to poison the cache with custom HTTP headers that may be unsanitized which can lead to Cross-Site Scripting.
Metrics
Affected Vendors & Products
References
History
Mon, 24 Feb 2025 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Megaoptim
Megaoptim rapid Cache |
|
Weaknesses | NVD-CWE-Other | |
CPEs | cpe:2.3:a:megaoptim:rapid_cache:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Megaoptim
Megaoptim rapid Cache |
Tue, 18 Feb 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 18 Feb 2025 04:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Rapid Cache plugin for WordPress is vulnerable to Cache Poisoning in all versions up to, and including, 1.2.3. This is due to plugin storing HTTP headers in the cached data. This makes it possible for unauthenticated attackers to poison the cache with custom HTTP headers that may be unsanitized which can lead to Cross-Site Scripting. | |
Title | Rapid Cache <= 1.2.3 - Unauthenticated Cache Poisoning | |
Weaknesses | CWE-524 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-02-18T04:21:17.575Z
Updated: 2025-02-18T17:07:04.172Z
Reserved: 2024-12-06T15:59:17.996Z
Link: CVE-2024-12314

Updated: 2025-02-18T14:25:54.343Z

Status : Analyzed
Published: 2025-02-18T05:15:09.987
Modified: 2025-02-24T12:40:54.730
Link: CVE-2024-12314

No data.