Stored XSS Vulnerability in LiteSpeed Cache
CVE-2024-47374

7.1HIGH

Key Information:

Vendor
WordPress
Vendor
CVE Published:
5 October 2024

Badges

👾 Exploit Exists📰 News Worthy

Summary

The CVE-2024-47374 vulnerability in the LiteSpeed Cache plugin for WordPress has been identified, allowing for the execution of arbitrary JavaScript code by potential cyber threats. The flaw impacts all versions of the plugin up to 6.5.0.2 and has been mitigated in version 6.5.1, with the root cause being inadequate sanitization and output escaping procedures in the plugin’s HTTP header values. The vulnerability poses a risk of stored XSS attacks, potentially compromising user data and website integrity. Timely patching and secure coding practices are crucial to protect against such vulnerabilities and maintain the overall security of the WordPress ecosystem. There is no indication of exploitation by ransomware groups at this time.

Affected Version(s)

LiteSpeed Cache <= 6.5.0.2

News Articles

Popular WordPress Caching Plugin Had a Major XSS Vulnerability

The WordPress Caching Plugin had three major XSS vulnerabilities, which have now been fixed by Patchstack. Here's more about it.

Single HTTP Request Can Exploit 6M WordPress Sites

The popular LiteSpeed Cache plug-in is vulnerable to unauthenticated privilege escalation via a dangerous XSS flaw.

Examining the Vulnerabilities in WordPress Plugins – Be3

A recent discovery has unveiled a significant security vulnerability in the LiteSpeed Cache plugin for WordPress, allowing the execution of arbitrary JavaScript code by potential cyber threats. The...

References

CVSS V3.1

Score:
7.1
Severity:
HIGH
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • 👾

    Exploit known to exist

  • 📰

    First article discovered by The Hacker News

  • Vulnerability Reserved

Credit

TaiYou (Patchstack Alliance)
.