Loading HuntDB...

CVE-2024-44000

CRITICAL
Published 2024-10-20T11:26:22.948Z
Actions:

CVSS Score

V3.1
9.8
/10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score Metrics
Exploitability: N/A Impact: N/A

EPSS Score

v2023.03.01
0.481
probability
of exploitation in the wild

There is a 48.1% chance that this vulnerability will be exploited in the wild within the next 30 days.

Updated: 2025-01-25
Exploit Probability
Percentile: 0.976
Higher than 97.6% of all CVEs

Attack Vector Metrics

Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED

Impact Metrics

Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Description

Insufficiently Protected Credentials vulnerability in LiteSpeed Technologies LiteSpeed Cache allows Authentication Bypass.This issue affects LiteSpeed Cache: from n/a before 6.5.0.1.

Available Exploits

LiteSpeed Cache <= 6.4.1 - Sensitive Information Exposure

The LiteSpeed Cache plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 6.4.1 through the debug.log file that is publicly exposed. This makes it possible for unauthenticated attackers to view potentially sensitive information contained in the exposed log file. The log file may contain user cookies making it possible for an attacker to log in with any session that is actively valid and exposed in the log file. Note: the debug feature must be enabled for this to be a concern and this feature is disabled by default.

ID: CVE-2024-44000
Author: s4e-io High

Related News

No news articles found for this CVE.

Affected Products

WordPress Vulnerability

Identified and analyzed by Wordfence

Software Type

Plugin

Patch Status

Patched

Published

September 5, 2024

Software Details

Software Name

LiteSpeed Cache

Software Slug

litespeed-cache

Affected Versions

* - 6.4.1

Patched Versions

6.5.0.1

Remediation

Update to version 6.5.0.1, or a newer patched version

© Defiant Inc. Data provided by Wordfence.

References

Published: 2024-10-20T11:26:22.948Z
Last Modified: 2024-10-21T19:11:21.875Z
Copied to clipboard!