Four Million WordPress Sites Vulnerable to LiteSpeed Plugin Flaw

Security

Cybersecurity researchers have discovered a significant vulnerability in the LiteSpeed Cache plugin for WordPress.

The vulnerability affects the LiteSpeed Cache plugin, which boasts over 4 million active installations, and presents a risk of unauthenticated site-wide stored XSS (cross-site scripting). This could potentially allow unauthorized access to sensitive information or privilege escalation on affected WordPress sites via a single HTTP request.

The flaw, discovered by the Patchstack team, stems from a lack of input sanitization and output escaping in the plugin’s code, combined with improper access control on one of its REST API endpoints. The issue was addressed in version 5.7.0.1 of the plugin, which was assigned CVE-2023-40000. Specifically, the vulnerability resides in the update_cdn_status function, triggered by the cdn_status REST API endpoint, allowing unauthenticated users to exploit the flaw.

To mitigate the risk, users are advised to update their LiteSpeed Cache plugin to the latest version. Additionally, developers are encouraged to implement proper input sanitization and output escaping in their code, particularly for data displayed in admin notices. The vendor has also implemented a permission check on the affected function to limit access to privileged users.

Despite the patch, the incident underscores the importance of proactive security measures in the development and maintenance of WordPress plugins, as vulnerabilities can have far-reaching consequences for website owners and users.

Read more on WordPress plugin vulnerabilities: Essential Addons Plugin Flaw Exposes One Million WordPress Websites

The vulnerability was first discovered on October 17 2023, prompting communication with the plugin vendor and the deployment of a vPatch rule to protect users. On October 25, the vendor released version 5.7.0.1 of the LiteSpeed Cache plugin to address the reported issues. Finally, the vulnerabilities were added to the Patchstack vulnerability database today, leading to the public release of the security advisory.

Products You May Like

Articles You May Like

Major phishing-as-a-service platform disrupted – Week in security with Tony Anscombe
Why space exploration is important for Earth and its future: Q&A with David Eicher
Ransomware Rising Despite Takedowns, Says Corvus Report
Google Prevented 2.28 Million Malicious Apps from Reaching Play Store in 2023
Study Reveals Alarming Levels of USPS Phishing Traffic

Leave a Reply

Your email address will not be published. Required fields are marked *