Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

A Critical Vulnerability in WordPress LiteSpeed Cache Plugin Exposes Sites to Malicious Takeovers



A high-severity vulnerability in the popular WordPress LiteSpeed Cache plugin has been discovered, allowing attackers to execute arbitrary JavaScript code under certain conditions. With over six million active installations, this widespread popularity makes it an attractive target for malicious actors seeking to exploit vulnerabilities in widely used plugins. The vulnerability could expose sites to malicious takeovers and further cyber threats.

  • A high-severity vulnerability (CVE-2024-47374) was discovered in the WordPress LiteSpeed Cache plugin.
  • The vulnerability allows attackers to execute arbitrary JavaScript code, potentially leading to site takeovers and further malicious activities.
  • The flaw arises from improper sanitization of the "X-LSCACHE-VARY-VALUE" HTTP header.
  • Exploiting this vulnerability could lead to hijacking a site administrator's account and taking full control of the website.
  • Site administrators are advised to apply escaping and sanitization to admin notices and perform permission checks on registered rest route endpoints.
  • A patch (version 6.5.1) was released on September 25, 2024, to mitigate the risk associated with this critical flaw.


  • In a recent development that has sent shockwaves throughout the cybersecurity community, researchers have identified a high-severity vulnerability in the popular WordPress LiteSpeed Cache plugin. This flaw, tracked as CVE-2024-47374 (CVSS score 7.2), could allow attackers to execute arbitrary JavaScript code under certain conditions, potentially leading to site takeovers and further malicious activities.

    The LiteSpeed Cache plugin is an all-in-one site acceleration tool that offers server-level caching and optimization features. With over six million active installations, it has become a staple for many WordPress sites. However, this widespread popularity also makes it an attractive target for malicious actors seeking to exploit vulnerabilities in widely used plugins.

    According to the advisory published by Patchstack bug bounty program for WordPress, the vulnerability arises from improper sanitization of the "X-LSCACHE-VARY-VALUE" HTTP header. This allows arbitrary script injection, which can be exploited only if the "CSS Combine" and "Generate UCSS" settings are enabled on the affected site.

    The severity of this vulnerability cannot be overstated. An attacker could potentially exploit this flaw to hijack the account of a site administrator and take full control of the website. This would enable them to upload malicious plugins, steal sensitive information, and engage in further malicious activities.

    To put this into perspective, the most damaging scenario is when the hijacked user account is that of a site administrator, thereby allowing a threat actor to completely take control of the website. This can lead to catastrophic consequences, including data breaches, DDoS attacks, and other forms of cyber vandalism.

    In light of this vulnerability, researchers from Patchstack have emphasized the importance of applying escaping and sanitization to any message that will be displayed as an admin notice. They recommend using sanitize_text_field() for HTML output (outside of HTML attribute) or esc_html() function for escaping values inside attributes. Moreover, a proper permission or authorization check is necessary for registered rest route endpoints.

    Fortunately, the vulnerability was addressed in version 6.5.1 on September 25, 2024, which has mitigated the risk associated with this critical flaw. However, given the widespread use of LiteSpeed Cache plugin, it is essential that site administrators take immediate action to address this vulnerability and ensure the security of their websites.

    The discovery of this vulnerability highlights the importance of staying vigilant in the ever-evolving landscape of cybersecurity threats. As researchers continue to uncover new vulnerabilities and weaknesses in widely used plugins, it is crucial for developers and site administrators to stay informed and take proactive measures to protect their online assets.

    In conclusion, the recent vulnerability in the WordPress LiteSpeed Cache plugin serves as a stark reminder of the potential consequences of neglecting security updates and patches. By staying informed and taking immediate action to address this critical flaw, site administrators can prevent malicious takeovers and further cyber threats.



    Related Information:

  • https://securityaffairs.com/169390/security/wordpress-litespeed-cache-plugin-flaw-site-takeover.html


  • Published: Sat Oct 5 09:32:39 2024 by llama3.2 3B Q4_K_M













         


    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us