Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

American agencies warn of Iranian protection cyber growth, OT networks and critical infrastructure

June 30, 2025

Europol demonstrates $ 540 million in cryptocurrency fraud, arrests five suspects

June 30, 2025

Slide

June 30, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » The LiteSpeed ​​Cache plugin vulnerability poses a significant risk to WordPress websites
Global Security

The LiteSpeed ​​Cache plugin vulnerability poses a significant risk to WordPress websites

AdminBy AdminOctober 31, 2024No Comments3 Mins Read
LiteSpeed Cache Plugin Vulnerability
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


October 31, 2024Ravi LakshmananWebsite Vulnerability / Security

LiteSpeed ​​​​Cache Plugin Vulnerability

A serious security flaw has been discovered in the LiteSpeed ​​Cache plugin for WordPress that could allow unauthenticated threat actors to elevate their privileges and perform malicious actions.

The vulnerability, tracked as CVE-2024-50550 (CVSS score: 8.1), was fixed in version 6.5.2 of the plugin.

“The plugin suffers from unauthenticated privilege escalation, which allows any unauthenticated visitor to gain administrator-level access, allowing malicious plugins to be downloaded and installed,” Patchstack security researcher Rafi Muhammad. said in the analysis.

LiteSpeed ​​​​Cache is a popular site acceleration plugin for WordPress that, as the name suggests, comes with advanced caching and optimization features. this installed on more than six million sites.

The newly discovered issue, according to Patchstack, is rooted in a feature called is_role_simulation and is similar to an earlier flaw that was publicly documented in August 2024 (CVE-2024-28000CVSS score: 9.8).

Cyber ​​security

This stems from the use of a weak security hash check that can be brute-forced by a bad actor, allowing the scanner functionality to be abused to impersonate a logged-in user, including an administrator.

However, successful operation depends on the following plugin configuration −

  • Crawler -> General Settings -> Crawler: ON
  • Crawler -> General Settings -> Run Duration: 2500 – 4000
  • Crawler View -> General Settings -> Interval Between Runs: 2500 – 4000
  • Crawler -> General Settings -> Server Load Limit: 0
  • Crawl -> Impersonation Settings -> Impersonate Role: 1 (User ID with Admin Role)
  • Crawler -> Summary -> Activate: Disable every line except admin

The patch installed by LiteSpeed ​​removes the role simulation process and updates the hash generation step with a random value generator to avoid limiting hashes to 1 million possibilities.

“This vulnerability highlights the critical importance of ensuring the strength and unpredictability of values ​​used as security hashes, or nonces,” Muhammad said.

“PHP’s rand() and mt_rand() functions return values ​​that may be ‘random enough’ for many use cases, but are not unpredictable enough to be used in security-related functions, especially when mt_srand is used in limited capacity.”

CVE-2024-50550 is the third security flaw discovered in LiteSpeed ​​in the last two months, the other two being CVE-2024-44000 (CVSS score: 7.5) and CVE-2024-47374 (CVSS Score: 7.2).

Cyber ​​security

The development came a few weeks after Patchstack in detail two critical flaws in Ultimate Membership Pro that could lead to privilege escalation and code execution. But the flaws were fixed in version 12.8 and later.

  • CVE-2024-43240 (CVSS Score: 9.4) – Unauthenticated elevation of privilege vulnerability could allow an attacker to sign in at any membership level and obtain an attached role
  • CVE-2024-43242 (CVSS Score: 9.0) – An unauthenticated PHP object implementation vulnerability could allow an attacker to execute arbitrary code.

Patchstack also warns that the legal drama continues between WordPress parent Automattic and WP Engine has prompted some developers to abandon the WordPress.org repository, requiring users to monitor the appropriate communication channels to ensure they are receiving the most up-to-date information on possible plugin shutdowns and security issues.

“Users who fail to manually install plugins that have been removed from the WordPress.org repository are at risk of not receiving new updates that may include important security fixes,” Patchstack CEO Oliver Seald. said. “This can make websites vulnerable to hackers who typically use known vulnerabilities and can take advantage in these situations.”

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

American agencies warn of Iranian protection cyber growth, OT networks and critical infrastructure

June 30, 2025

Europol demonstrates $ 540 million in cryptocurrency fraud, arrests five suspects

June 30, 2025

Slide

June 30, 2025

Pragmatic approach to NHI stocks

June 30, 2025

FBI warns about expanded spider attacks on airline using social engineering

June 28, 2025

The new AI Facebook tool asks for upload your photos for plot ideas, causing privacy trouble

June 28, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

American agencies warn of Iranian protection cyber growth, OT networks and critical infrastructure

June 30, 2025

Europol demonstrates $ 540 million in cryptocurrency fraud, arrests five suspects

June 30, 2025

Slide

June 30, 2025

Pragmatic approach to NHI stocks

June 30, 2025

FBI warns about expanded spider attacks on airline using social engineering

June 28, 2025

The new AI Facebook tool asks for upload your photos for plot ideas, causing privacy trouble

June 28, 2025

From the theft of the browser to the intelligence collection instrument

June 28, 2025

More than 1000 SOHO devices hacked in China associated with cyber-science associated with cyber

June 27, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

American agencies warn of Iranian protection cyber growth, OT networks and critical infrastructure

June 30, 2025

Europol demonstrates $ 540 million in cryptocurrency fraud, arrests five suspects

June 30, 2025

Slide

June 30, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.