Remote Code Execution Vulnerability in W3SPEEDSTER Plugin
CVE-2024-8512

9.1CRITICAL

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
30 October 2024

Summary

The W3SPEEDSTER plugin for WordPress is susceptible to Remote Code Execution due to a flaw in handling user inputs within the hookBeforeStartOptimization() function. Authenticated attackers, possessing Administrator-level access or higher, can exploit the vulnerability by passing arbitrary code through the 'script' parameter. The plugin's reliance on eval() to execute input without proper validation increases the risk, allowing potential manipulation of server-side functions. Web administrators using affected versions should consider immediate updates to mitigate the risks associated with this vulnerability.

References

EPSS Score

32% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

.
🍪 This website uses cookies, like every other website on the internet 😕 By using our website, you consent to the use of cookies.