Incorrect Privilege Assignment vulnerability in LiteSpeed Cache allows Privilege Escalation

CVE-2024-28000
9.8CRITICAL

Key Information

Vendor
Litespeed Technologies
Status
Litespeed Cache
Vendor
CVE Published:
21 August 2024

Badges

đź‘ľ Exploit Existsđź”´ Public PoCđź“° News Worthy

Summary

The CVE-2024-28000 vulnerability is found in the widely-used LiteSpeed Cache Plugin for WordPress websites, allowing unauthenticated users to gain administrator-level access and create new user accounts with the administrator role. This critical privilege escalation vulnerability has a high CVSS score of 9.8 and has been patched in version 6.4 of the plugin. It is advised to update the plugin immediately to protect against potential exploitation. The vulnerability stems from the plugin’s user simulation feature and poses a significant risk to the security of WordPress websites. Although it has not been exploited by ransomware groups, researchers have warned that active exploitation is likely to occur soon.

Affected Version(s)

LiteSpeed Cache <= 6.3.0.1

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • đź‘ľ

    Exploit exists.

  • First article discovered by WP Tavern

  • Vulnerability published.

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre Database4 Proof of Concept(s)1 News Article(s)

Credit

John Blackbourn (Patchstack Bug Bounty Program)
.