CVE-2024-13651: CWE-862 Missing Authorization in shakee93 RapidLoad – Optimize Web Vitals Automatically
CVE-2024-13651 is a medium severity vulnerability in the WordPress plugin RapidLoad – Optimize Web Vitals Automatically by shakee93. The flaw arises from a missing authorization check in the ajax_deactivate() function, allowing authenticated users with Subscriber-level access or higher to reset certain plugin settings without proper permission. This vulnerability does not impact confidentiality or availability but allows unauthorized integrity modification of plugin configuration. Exploitation requires no user interaction beyond authentication and can be performed remotely. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize updating or applying custom access controls to prevent unauthorized setting changes. The vulnerability primarily affects WordPress sites globally, especially those with many low-privilege users. Countries with large WordPress user bases and significant web hosting industries are at higher risk. The CVSS score is 4. 3, reflecting a medium severity due to limited impact scope and required authentication.
AI Analysis
Technical Summary
CVE-2024-13651 is a vulnerability identified in the WordPress plugin RapidLoad – Optimize Web Vitals Automatically, developed by shakee93, affecting all versions up to and including 2.4.4. The root cause is a missing capability check in the ajax_deactivate() function, which is responsible for deactivating or resetting plugin settings via an AJAX request. Because the function lacks proper authorization controls, any authenticated user with at least Subscriber-level privileges can invoke this function and reset some of the plugin's configuration settings without elevated permissions. This vulnerability is classified under CWE-862 (Missing Authorization). The attack vector is network-based (remote), requiring only low-level authenticated access, and no user interaction is needed beyond authentication. The vulnerability impacts the integrity of the plugin’s settings but does not affect confidentiality or availability. The CVSS v3.1 base score is 4.3 (medium), with vector AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N, indicating low attack complexity, low privileges required, no user interaction, and limited impact scope. No public exploits or patches are currently reported, but the vulnerability is published and should be addressed promptly by site administrators.
Potential Impact
The primary impact of CVE-2024-13651 is unauthorized modification of plugin settings, which could lead to suboptimal performance or misconfiguration of the RapidLoad plugin. While this does not directly compromise sensitive data or site availability, altered settings could degrade website performance, affect user experience, or interfere with web vitals optimization, potentially impacting SEO and site reputation. Attackers with Subscriber-level access, often easy to obtain or compromise, can exploit this flaw to disrupt site optimization silently. Organizations relying on this plugin for performance improvements may experience degraded service quality or inconsistent behavior. Although the impact is limited to plugin settings integrity, it could serve as a stepping stone for further attacks if combined with other vulnerabilities or misconfigurations. The vulnerability affects any WordPress site using this plugin, which may include small to medium businesses, blogs, and larger enterprises leveraging WordPress for web presence.
Mitigation Recommendations
To mitigate CVE-2024-13651, site administrators should immediately verify user roles and restrict Subscriber-level access where possible, minimizing the number of users with low-level authenticated access. Applying principle of least privilege to WordPress user roles reduces exploitation risk. Since no official patch is currently available, administrators can implement custom code to add capability checks to the ajax_deactivate() function, ensuring only authorized roles (e.g., Administrator) can invoke it. Monitoring and logging AJAX requests related to plugin settings changes can help detect unauthorized attempts. Additionally, consider temporarily disabling or uninstalling the RapidLoad plugin if it is not critical until a patch is released. Regularly check for updates from the vendor and apply patches promptly once available. Employing Web Application Firewalls (WAFs) with rules to restrict suspicious AJAX calls may provide an additional layer of defense.
Affected Countries
United States, Germany, United Kingdom, India, Canada, Australia, France, Brazil, Japan, Netherlands
CVE-2024-13651: CWE-862 Missing Authorization in shakee93 RapidLoad – Optimize Web Vitals Automatically
Description
CVE-2024-13651 is a medium severity vulnerability in the WordPress plugin RapidLoad – Optimize Web Vitals Automatically by shakee93. The flaw arises from a missing authorization check in the ajax_deactivate() function, allowing authenticated users with Subscriber-level access or higher to reset certain plugin settings without proper permission. This vulnerability does not impact confidentiality or availability but allows unauthorized integrity modification of plugin configuration. Exploitation requires no user interaction beyond authentication and can be performed remotely. No known exploits are currently reported in the wild. Organizations using this plugin should prioritize updating or applying custom access controls to prevent unauthorized setting changes. The vulnerability primarily affects WordPress sites globally, especially those with many low-privilege users. Countries with large WordPress user bases and significant web hosting industries are at higher risk. The CVSS score is 4. 3, reflecting a medium severity due to limited impact scope and required authentication.
AI-Powered Analysis
Technical Analysis
CVE-2024-13651 is a vulnerability identified in the WordPress plugin RapidLoad – Optimize Web Vitals Automatically, developed by shakee93, affecting all versions up to and including 2.4.4. The root cause is a missing capability check in the ajax_deactivate() function, which is responsible for deactivating or resetting plugin settings via an AJAX request. Because the function lacks proper authorization controls, any authenticated user with at least Subscriber-level privileges can invoke this function and reset some of the plugin's configuration settings without elevated permissions. This vulnerability is classified under CWE-862 (Missing Authorization). The attack vector is network-based (remote), requiring only low-level authenticated access, and no user interaction is needed beyond authentication. The vulnerability impacts the integrity of the plugin’s settings but does not affect confidentiality or availability. The CVSS v3.1 base score is 4.3 (medium), with vector AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N, indicating low attack complexity, low privileges required, no user interaction, and limited impact scope. No public exploits or patches are currently reported, but the vulnerability is published and should be addressed promptly by site administrators.
Potential Impact
The primary impact of CVE-2024-13651 is unauthorized modification of plugin settings, which could lead to suboptimal performance or misconfiguration of the RapidLoad plugin. While this does not directly compromise sensitive data or site availability, altered settings could degrade website performance, affect user experience, or interfere with web vitals optimization, potentially impacting SEO and site reputation. Attackers with Subscriber-level access, often easy to obtain or compromise, can exploit this flaw to disrupt site optimization silently. Organizations relying on this plugin for performance improvements may experience degraded service quality or inconsistent behavior. Although the impact is limited to plugin settings integrity, it could serve as a stepping stone for further attacks if combined with other vulnerabilities or misconfigurations. The vulnerability affects any WordPress site using this plugin, which may include small to medium businesses, blogs, and larger enterprises leveraging WordPress for web presence.
Mitigation Recommendations
To mitigate CVE-2024-13651, site administrators should immediately verify user roles and restrict Subscriber-level access where possible, minimizing the number of users with low-level authenticated access. Applying principle of least privilege to WordPress user roles reduces exploitation risk. Since no official patch is currently available, administrators can implement custom code to add capability checks to the ajax_deactivate() function, ensuring only authorized roles (e.g., Administrator) can invoke it. Monitoring and logging AJAX requests related to plugin settings changes can help detect unauthorized attempts. Additionally, consider temporarily disabling or uninstalling the RapidLoad plugin if it is not critical until a patch is released. Regularly check for updates from the vendor and apply patches promptly once available. Employing Web Application Firewalls (WAFs) with rules to restrict suspicious AJAX calls may provide an additional layer of defense.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-01-23T15:07:11.840Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e64b7ef31ef0b59fe06
Added to database: 2/25/2026, 9:49:24 PM
Last enriched: 2/25/2026, 11:14:09 PM
Last updated: 2/26/2026, 7:00:17 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.