Data Modification Vulnerability in SpeedyCache Plugin for WordPress
CVE-2023-6598
4.3MEDIUM
Key Information:
- Vendor
- Wordpress
- Vendor
- CVE Published:
- 11 January 2024
Summary
The SpeedyCache plugin for WordPress is susceptible to unauthorized data modification due to insufficient capability checks in multiple functions. This vulnerability allows authenticated users with subscriber-level access and above to exploit the functionality to change plugin options. The affected functions include speedycache_save_varniship, speedycache_img_update_settings, speedycache_preloading_add_settings, and speedycache_preloading_delete_resource. Users are encouraged to update to the latest version to mitigate risks associated with this vulnerability.
Affected Version(s)
SpeedyCache – Cache, Optimization, Performance * <= 1.1.3
References
CVSS V3.1
Score:
4.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Lucio Sá