Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13651: CWE-862 Missing Authorization in shakee93 RapidLoad – Optimize Web Vitals Automatically

0
Medium
VulnerabilityCVE-2024-13651cvecve-2024-13651cwe-862
Published: Sat Feb 01 2025 (02/01/2025, 03:21:12 UTC)
Source: CVE Database V5
Vendor/Project: shakee93
Product: RapidLoad – Optimize Web Vitals Automatically

Description

CVE-2024-13651 is a medium severity vulnerability in the WordPress plugin RapidLoad – Optimize Web Vitals Automatically by shakee93. The flaw arises from a missing authorization check in the ajax_deactivate() function, allowing authenticated users with Subscriber-level access or higher to reset certain plugin settings without proper permission. This vulnerability does not impact confidentiality or availability but allows unauthorized integrity modification of plugin configuration. Exploitation requires no user interaction beyond authentication and can be performed remotely. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize updating or applying custom access controls to prevent unauthorized setting changes. The vulnerability primarily affects WordPress sites globally, especially those with many low-privilege users. Countries with large WordPress user bases and significant web hosting industries are at higher risk. The CVSS score is 4. 3, reflecting a medium severity due to limited impact scope and required authentication.

AI-Powered Analysis

AILast updated: 02/25/2026, 23:14:09 UTC

Technical Analysis

CVE-2024-13651 is a vulnerability identified in the WordPress plugin RapidLoad – Optimize Web Vitals Automatically, developed by shakee93, affecting all versions up to and including 2.4.4. The root cause is a missing capability check in the ajax_deactivate() function, which is responsible for deactivating or resetting plugin settings via an AJAX request. Because the function lacks proper authorization controls, any authenticated user with at least Subscriber-level privileges can invoke this function and reset some of the plugin's configuration settings without elevated permissions. This vulnerability is classified under CWE-862 (Missing Authorization). The attack vector is network-based (remote), requiring only low-level authenticated access, and no user interaction is needed beyond authentication. The vulnerability impacts the integrity of the plugin’s settings but does not affect confidentiality or availability. The CVSS v3.1 base score is 4.3 (medium), with vector AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N, indicating low attack complexity, low privileges required, no user interaction, and limited impact scope. No public exploits or patches are currently reported, but the vulnerability is published and should be addressed promptly by site administrators.

Potential Impact

The primary impact of CVE-2024-13651 is unauthorized modification of plugin settings, which could lead to suboptimal performance or misconfiguration of the RapidLoad plugin. While this does not directly compromise sensitive data or site availability, altered settings could degrade website performance, affect user experience, or interfere with web vitals optimization, potentially impacting SEO and site reputation. Attackers with Subscriber-level access, often easy to obtain or compromise, can exploit this flaw to disrupt site optimization silently. Organizations relying on this plugin for performance improvements may experience degraded service quality or inconsistent behavior. Although the impact is limited to plugin settings integrity, it could serve as a stepping stone for further attacks if combined with other vulnerabilities or misconfigurations. The vulnerability affects any WordPress site using this plugin, which may include small to medium businesses, blogs, and larger enterprises leveraging WordPress for web presence.

Mitigation Recommendations

To mitigate CVE-2024-13651, site administrators should immediately verify user roles and restrict Subscriber-level access where possible, minimizing the number of users with low-level authenticated access. Applying principle of least privilege to WordPress user roles reduces exploitation risk. Since no official patch is currently available, administrators can implement custom code to add capability checks to the ajax_deactivate() function, ensuring only authorized roles (e.g., Administrator) can invoke it. Monitoring and logging AJAX requests related to plugin settings changes can help detect unauthorized attempts. Additionally, consider temporarily disabling or uninstalling the RapidLoad plugin if it is not critical until a patch is released. Regularly check for updates from the vendor and apply patches promptly once available. Employing Web Application Firewalls (WAFs) with rules to restrict suspicious AJAX calls may provide an additional layer of defense.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-23T15:07:11.840Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e64b7ef31ef0b59fe06

Added to database: 2/25/2026, 9:49:24 PM

Last enriched: 2/25/2026, 11:14:09 PM

Last updated: 2/26/2026, 7:00:17 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats