A brand new high-severity safety flaw has been disclosed within the LiteSpeed Cache plugin for WordPress that might allow malicious actors to execute arbitrary JavaScript code underneath sure circumstances.
The flaw, tracked as CVE-2024-47374 (CVSS rating: 7.2), has been described as a saved cross-site scripting (XSS) vulnerability impacting all variations of the plugin as much as and together with 6.5.0.2.
It was addressed in model 6.5.1 on September 25, 2024, following accountable disclosure by Patchstack Alliance researcher TaiYou.
“It might enable any unauthenticated person from stealing delicate info to, on this case, privilege escalation on the WordPress website by performing a single HTTP request,” Patchstack stated in a report.
The flaw stems from the way wherein the plugin the “X-LSCACHE-VARY-VALUE” HTTP header worth is parsed with out ample sanitization and output escaping, thereby permitting for injection of arbitrary net scripts.
That stated, it is value mentioning that the Web page Optimization settings “CSS Mix” and “Generate UCSS” are required to allow the exploit to achieve success.
Additionally referred to as persistent XSS assaults, such vulnerabilities make it doable to retailer an injected script completely on the goal web site’s servers, similar to in a database, in a message discussion board, in a customer log, or in a remark.
This causes the malicious code embedded throughout the script to be executed each time an unsuspecting website customer lands on the requested useful resource, for example, the net web page containing the specifically crafted remark.
Saved XSS assaults can have severe penalties as they may very well be weaponized to ship browser-based exploits, steal delicate info, and even hijack an authenticated person’s session and carry out actions on their behalf.
Essentially the most damaging state of affairs is when the hijacked person account is that of a website administrator, thereby permitting a risk actor to fully take management of the web site and stage much more highly effective assaults.
WordPress plug-ins and themes are a preferred avenue for cybercriminals trying to compromise official web sites. With LiteSpeed Cache boasting over six million energetic installations, flaws within the plugin pose a profitable assault floor for opportunistic assaults.
The most recent patch arrives almost a month after the plugin builders addressed one other flaw (CVE-2024-44000, CVSS rating: 7.5) that might enable unauthenticated customers to take management of arbitrary accounts.
It additionally follows the disclosure of an unpatched vital SQL injection flaw within the TI WooCommerce Wishlist plugin (CVE-2024-43917, CVSS rating: 9.8) that, if efficiently exploited, permits any person to execute arbitrary SQL queries within the database of the WordPress website.
One other vital safety vulnerability issues the Jupiter X Core WordPress plugin (CVE-2024-7772, CVSS rating: 9.8) that enables unauthenticated attackers to add arbitrary information on the affected website’s server, doubtlessly resulting in distant code execution.
It has been fastened in model 4.7.8, together with a high-severity authentication bypass flaw (CVE-2024-7781, CVSS rating: 8.1) that “makes it doable for unauthenticated attackers to log in as the primary person to have logged in with a social media account, together with administrator accounts,” Wordfence stated.