Vulnerability found in Rapid Cache

The Rapid Cache plugin for WordPress has a security issue in all its versions, up to and including 1.2.3. The problem is that the plugin stores certain information in the cached data, making it possible for attackers to manipulate the cache and potentially inject harmful code. This can be done by anyone without authorization, and it may result in a type of cyber attack called Cross-Site Scripting.

Detected in:

Rapid Cache open vulnerable versions: >= * <= 1.2.3

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.