CVE-2024-12314

The Rapid Cache plugin for WordPress is vulnerable to Cache Poisoning in all versions up to, and including, 1.2.3. This is due to plugin storing HTTP headers in the cached data. This makes it possible for unauthenticated attackers to poison the cache with custom HTTP headers that may be unsanitized which can lead to Cross-Site Scripting.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

cpe:2.3:a:megaoptim:rapid_cache:*:*:*:*:*:wordpress:*:*

History

24 Feb 2025, 12:40

Type Values Removed Values Added
First Time Megaoptim rapid Cache
Megaoptim
CPE cpe:2.3:a:megaoptim:rapid_cache:*:*:*:*:*:wordpress:*:*
CWE CWE-524 NVD-CWE-Other
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/72b777ac-1870-4588-82fe-da96a784ec81?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/72b777ac-1870-4588-82fe-da96a784ec81?source=cve - Third Party Advisory
References () https://wordpress.org/plugins/rapid-cache/ - () https://wordpress.org/plugins/rapid-cache/ - Product

18 Feb 2025, 15:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 7.2
v2 : unknown
v3 : unknown

18 Feb 2025, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-18 05:15

Updated : 2025-02-24 12:40


NVD link : CVE-2024-12314

Mitre link : CVE-2024-12314


JSON object : View

Products Affected

megaoptim

  • rapid_cache