WP Super Cache < 1.7.2 - Authenticated Remote Code Execution (RCE)
CVE-2021-24209

7.2HIGH

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
5 April 2021

Summary

The WP Super Cache WordPress plugin before 1.7.2 was affected by an authenticated (admin+) RCE in the settings page due to input validation failure and weak $cache_path check in the WP Super Cache Settings -> Cache Location option. Direct access to the wp-cache-config.php file is not prohibited, so this vulnerability can be exploited for a web shell injection.

Affected Version(s)

WP Super Cache 0 < 1.7.2

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

m0ze
WPScan
.