Loading HuntDB...

CVE-2021-24312

UNKNOWN
Published 2021-06-01T11:33:30
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2021-24312. We'll provide specific mitigation strategies based on your environment and risk profile.

No CVSS data available

Description

The parameters $cache_path, $wp_cache_debug_ip, $wp_super_cache_front_page_text, $cache_scheduled_time, $cached_direct_pages used in the settings of WP Super Cache WordPress plugin before 1.7.3 result in RCE because they allow input of '$' and '\n'. This is due to an incomplete fix of CVE-2021-24209.

Available Exploits

No exploits available for this CVE.

Related News

No news articles found for this CVE.

Affected Products

WordPress Vulnerability

Identified and analyzed by Wordfence

Software Type

Plugin

Patch Status

Patched

Published

May 14, 2021

Software Details

Software Name

WP Super Cache

Software Slug

wp-super-cache

Affected Versions

[*, 1.7.3)

Patched Versions

1.7.3

Remediation

Update to version 1.7.3, or a newer patched version

© Defiant Inc. Data provided by Wordfence.

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

⚠ Unreviewed HIGH

GHSA-5r22-g25f-j577

Advisory Details

The parameters $cache_path, $wp_cache_debug_ip, $wp_super_cache_front_page_text, $cache_scheduled_time, $cached_direct_pages used in the settings of WP Super Cache WordPress plugin before 1.7.3 result in RCE because they allow input of '$' and '\n'. This is due to an incomplete fix of CVE-2021-24209.

CVSS Scoring

CVSS Score

7.5

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Advisory provided by GitHub Security Advisory Database. Published: May 24, 2022, Modified: July 30, 2022

References

Published: 2021-06-01T11:33:30
Last Modified: 2024-08-03T19:28:23.442Z
Copied to clipboard!