A brand new high-severity security flaw has been disclosed within the LiteSpeed Cache plugin for WordPress that would allow malicious actors to execute arbitrary JavaScript code beneath sure situations.
The flaw, tracked as CVE-2024-47374 (CVSS rating: 7.2), has been described as a saved cross-site scripting (XSS) vulnerability impacting all variations of the plugin as much as and together with 6.5.0.2.
It was addressed in model 6.5.1 on September 25, 2024, following accountable disclosure by Patchstack Alliance researcher TaiYou.
“It may enable any unauthenticated consumer from stealing delicate info to, on this case, privilege escalation on the WordPress website by performing a single HTTP request,” Patchstack mentioned in a report.
The flaw stems from the way wherein the plugin the “X-LSCACHE-VARY-VALUE” HTTP header worth is parsed with out ample sanitization and output escaping, thereby permitting for injection of arbitrary internet scripts.
That mentioned, it is price mentioning that the Web page Optimization settings “CSS Mix” and “Generate UCSS” are required to allow the exploit to achieve success.
Additionally referred to as persistent XSS assaults, such vulnerabilities make it potential to retailer an injected script completely on the goal web site’s servers, similar to in a database, in a message discussion board, in a customer log, or in a remark.
This causes the malicious code embedded throughout the script to be executed each time an unsuspecting website customer lands on the requested useful resource, as an illustration, the net web page containing the specifically crafted remark.
Saved XSS assaults can have severe penalties as they could possibly be weaponized to ship browser-based exploits, steal delicate info, and even hijack an authenticated consumer’s session and carry out actions on their behalf.
Probably the most damaging state of affairs is when the hijacked consumer account is that of a website administrator, thereby permitting a risk actor to fully take management of the web site and stage much more highly effective assaults.
WordPress plug-ins and themes are a well-liked avenue for cybercriminals seeking to compromise official web sites. With LiteSpeed Cache boasting over six million energetic installations, flaws within the plugin pose a profitable assault floor for opportunistic assaults.
The most recent patch arrives practically a month after the plugin builders addressed one other flaw (CVE-2024-44000, CVSS rating: 7.5) that would enable unauthenticated customers to take management of arbitrary accounts.
It additionally follows the disclosure of an unpatched crucial SQL injection flaw within the TI WooCommerce Wishlist plugin (CVE-2024-43917, CVSS rating: 9.8) that, if efficiently exploited, permits any consumer to execute arbitrary SQL queries within the database of the WordPress website.
One other crucial security vulnerability issues the Jupiter X Core WordPress plugin (CVE-2024-7772, CVSS rating: 9.8) that enables unauthenticated attackers to add arbitrary information on the affected website’s server, probably resulting in distant code execution.
It has been mounted in model 4.7.8, together with a high-severity authentication bypass flaw (CVE-2024-7781, CVSS rating: 8.1) that “makes it potential for unauthenticated attackers to log in as the primary consumer to have logged in with a social media account, together with administrator accounts,” Wordfence mentioned.