Remote Code Execution Vulnerability in W3SPEEDSTER Plugin
CVE-2024-8512

9.1CRITICAL

Key Information:

Vendor
W3SPEEDSTER
Vendor
CVE Published:
30 October 2024

Summary

The W3SPEEDSTER plugin for WordPress is susceptible to Remote Code Execution due to a flaw in handling user inputs within the hookBeforeStartOptimization() function. Authenticated attackers, possessing Administrator-level access or higher, can exploit the vulnerability by passing arbitrary code through the 'script' parameter. The plugin's reliance on eval() to execute input without proper validation increases the risk, allowing potential manipulation of server-side functions. Web administrators using affected versions should consider immediate updates to mitigate the risks associated with this vulnerability.

References

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

.