"Litespeed Cache Plugin Flaw Allows XSS Attack, Update Now"

Security researchers at Patchstack discovered a new vulnerability in the LiteSpeed Cache plugin for WordPress that could allow unauthenticated attackers to inject malicious code into websites. The flaw impacts the plugin’s CSS queue generation process and affects over six million active installations. The vulnerability, tracked as CVE-2024-47374, is an unauthenticated stored XSS issue that could lead to privilege escalation or data theft. The researchers noted that it exploits the plugin’s “Vary Group” functionality, which controls cache variations based on user roles.  Attackers can manipulate this functionality via specially crafted HTTP headers, injecting harmful content directly into the WordPress admin panel. The researchers stated that this vulnerability occurs because the code that handles the view of the queue doesn’t implement sanitization and output escaping. LiteSpeed has addressed the vulnerability in version 6.5.1, which implements proper input sanitization using the esc_html function to prevent malicious code injection. Users of the LiteSpeed Cache plugin are strongly advised to update to the latest version to safeguard their sites from potential attacks.

 

Infosecurity Magazine reports: "Litespeed Cache Plugin Flaw Allows XSS Attack, Update Now"

Submitted by Adam Ekwall on