HomeCyberSecurity NewsSecurity Vulnerability in LiteSpeed Cache Plugin for WordPress Puts Sites at Risk...

Security Vulnerability in LiteSpeed Cache Plugin for WordPress Puts Sites at Risk of XSS Attacks

A critical security vulnerability has been revealed in the LiteSpeed Cache plugin for WordPress, allowing attackers to run arbitrary JavaScript code. This flaw, identified as CVE-2024-47374 with a CVSS score of 7.2, affects all versions up to 6.5.0.2. It was fixed in version 6.5.1 on September 25, 2024, after being responsibly disclosed by TaiYou from Patchstack.

The vulnerability is a stored cross-site scripting (XSS) flaw, enabling unauthorized users to execute malicious scripts on a targeted WordPress site. The issue arises from the plugin’s handling of HTTP header values, specifically the “X-LSCACHE-VARY-VALUE” parameter.

For the exploit to work, specific Page Optimization settings must be enabled. Stored XSS attacks, like this one, can have severe consequences, including data theft and privilege escalation.

WordPress plugins are frequently targeted by cybercriminals, as seen with the LiteSpeed Cache plugin’s large user base of over six million active installations. This incident occurred just a month after another security flaw (CVE-2024-44000) was addressed by the developers.

Other recent vulnerabilities in WordPress plugins like TI WooCommerce Wishlist and Jupiter X Core have also been disclosed, emphasizing the importance of timely security patching and updates.

RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest News