Remote Code Execution Vulnerability in W3SPEEDSTER Plugin
CVE-2024-8512
9.1CRITICAL
Key Information
- Vendor
- W3SPEEDSTER
- Vendor
- CVE Published:
- 30 October 2024
Summary
The W3SPEEDSTER plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 7.26 via the 'script' parameter of the hookBeforeStartOptimization() function. This is due to the plugin passing user supplied input to eval(). This makes it possible for authenticated attackers, with Administrator-level access and above, to execute code on the server.
CVSS V3.1
Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published.
Collectors
NVD Database