HomeVulnerabilityWordPress LiteSpeed Plugin Vulnerability Places 5 Million Websites at Threat

WordPress LiteSpeed Plugin Vulnerability Places 5 Million Websites at Threat

A security vulnerability has been disclosed within the LiteSpeed Cache plugin for WordPress that would allow unauthenticated customers to escalate their privileges.

Tracked as CVE-2023-40000, the vulnerability was addressed in October 2023 in model 5.7.0.1.

“This plugin suffers from unauthenticated site-wide saved [cross-site scripting] vulnerability and will enable any unauthenticated consumer from stealing delicate data to, on this case, privilege escalation on the WordPress website by performing a single HTTP request,” Patchstack researcher Rafie Muhammad mentioned.

LiteSpeed Cache, which is used to enhance website efficiency, has greater than 5 million installations. The most recent model of the plugin in 6.1, which was launched on February 5, 2024.

The WordPress security firm mentioned CVE-2023-40000 is the results of a scarcity of consumer enter sanitization and escaping output. The vulnerability is rooted in a operate named update_cdn_status() and might be reproduced in a default set up.

“For the reason that XSS payload is positioned as an admin discover and the admin discover could possibly be displayed on any wp-admin endpoint, this vulnerability additionally could possibly be simply triggered by any consumer that has entry to the wp-admin space,” Muhammad mentioned.

WordPress LiteSpeed Plugin

The disclosure arrives 4 months after Wordfence revealed one other XSS flaw in the identical plugin (CVE-2023-4372, CVSS rating: 6.4) resulting from inadequate enter sanitization and output escaping on consumer equipped attributes. It was addressed in model 5.7.

See also  GitLab Releases Pressing Safety Patches for Vital Vulnerability

“This makes it attainable for authenticated attackers with contributor-level and above permissions to inject arbitrary internet scripts in pages that may execute at any time when a consumer accesses an injected web page,” István Márton mentioned.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular