Close Menu
Indo Guard OnlineIndo Guard Online
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
What's Hot

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025
Facebook X (Twitter) Instagram
Facebook X (Twitter) Instagram YouTube
Indo Guard OnlineIndo Guard Online
Subscribe
  • Home
  • Cyber Security
  • Risk Management
  • Travel
  • Security News
  • Tech
  • More
    • Data Privacy
    • Data Protection
    • Global Security
Indo Guard OnlineIndo Guard Online
Home » A critical flaw in the WordPress LiteSpeed ​​​​Cache plugin allows hackers to gain administrator access
Global Security

A critical flaw in the WordPress LiteSpeed ​​​​Cache plugin allows hackers to gain administrator access

AdminBy AdminAugust 22, 2024No Comments3 Mins Read
WordPress LiteSpeed Cache
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link


August 22, 2024Ravi LakshmananWebsite Security / Vulnerability

WordPress LiteSpeed ​​Cache

Cybersecurity researchers have discovered a critical security flaw in the LiteSpeed ​​cache a plugin for WordPress that can allow unauthenticated users to gain admin rights.

“The plugin suffers from unauthenticated privilege escalation, which allows any unauthenticated visitor to gain administrator-level access, allowing malicious plugins to be downloaded and installed,” Patchstack’s Rafi Muhammad. said in Wednesday’s report.

The vulnerability, identified as CVE-2024-28000 (CVSS score: 9.8), was fixed in version 6.4 of the plugin, released on August 13, 2024. It affects all versions of the plugin, including those earlier than 6.3.0.1.

Cyber ​​security

LiteSpeed ​​​​Cache is one of the most used WordPress caching plugins with over five million active installations.

In a nutshell, CVE-2024-28000 allows an unauthenticated attacker to spoof their user ID and register as an administrative user, effectively giving them privileges to take over a vulnerable WordPress site.

The vulnerability is rooted in the user simulation feature of the plugin, which uses a weak security hash that suffers from using a random number that can be easily guessed as a seed.

In particular, there are only one million possible values ​​for the security hash due to the fact that the random number generator derives from a microsecond fraction of the current time. Moreover, the random number generator is not cryptographically secure, and the generated hash is not tied to a specific request or user.

“This is because the plugin doesn’t properly restrict the role simulation functionality to allow the user to set their current ID to the admin ID if they have access to a valid hash, which can be found in the debug logs or via brute force.” Wordfence said in their own readiness.

“This allows unauthenticated attackers to spoof their user ID as an admin ID and then create a new user account with the admin role using the /wp-json/wp/v2/users REST API endpoint.”

Cyber ​​security

It is important to note that the vulnerability cannot be exploited on Windows-based installations of WordPress due to the fact that the hash generation function depends on a PHP method called sys_getloadavg() this is not implemented in Windows.

“This vulnerability highlights the critical importance of ensuring the strength and unpredictability of values ​​used as security hashes, or nonces,” Muhammad said.

With a previously discovered flaw in LiteSpeed ​​​​Cache (CVE-2023-40000CVSS score: 8.3) used by attackers, it is very important that users update their instances to the latest version quickly.

Did you find this article interesting? Follow us Twitter  and LinkedIn to read more exclusive content we publish.





Source link

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Admin
  • Website

Related Posts

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025

Why DNS Safety – Your First Cyber ​​Protection?

June 11, 2025

Interpol Demonrates 20,000+ malicious IPS related to 69 malware work

June 11, 2025

GPS Sinotrack GPS devices are vulnerable to distance driving through default passwords

June 11, 2025
Add A Comment
Leave A Reply Cancel Reply

Loading poll ...
Coming Soon
Do You Like Our Website
: {{ tsp_total }}

Subscribe to Updates

Get the latest security news from Indoguardonline.com

Latest Posts

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025

Why DNS Safety – Your First Cyber ​​Protection?

June 11, 2025

Interpol Demonrates 20,000+ malicious IPS related to 69 malware work

June 11, 2025

GPS Sinotrack GPS devices are vulnerable to distance driving through default passwords

June 11, 2025

Microsoft Patches 67 vulnerability, including Zero-Day Webdav, is exploited in the wild

June 11, 2025

Researchers disclose configuration risks, including five CVE, in the Salesforce Industry Cloud

June 10, 2025
About Us
About Us

Provide a constantly updating feed of the latest security news and developments specific to Indonesia.

Facebook X (Twitter) Pinterest YouTube WhatsApp
Our Picks

Former Black Basta Members use Microsoft teams and Python scripts in 2025

June 11, 2025

295 malicious IPS launch coordinated attacks of gross force on Apache Tomcat Manager

June 11, 2025

5 lessons from River Island

June 11, 2025
Most Popular

In Indonesia, crippling immigration ransomware breach sparks privacy crisis

July 6, 2024

Why Indonesia’s Data Breach Crisis Calls for Better Security

July 6, 2024

Indonesia’s plan to integrate 27,000 govt apps in one platform welcomed but data security concerns linger

July 6, 2024
© 2025 indoguardonline.com
  • Home
  • About us
  • Contact us
  • Privacy Policy

Type above and press Enter to search. Press Esc to cancel.