CVE-2024-44000
CVSS Score
V3.1EPSS Score
v2023.03.01There is a 48.1% chance that this vulnerability will be exploited in the wild within the next 30 days.
Attack Vector Metrics
Impact Metrics
Description
Insufficiently Protected Credentials vulnerability in LiteSpeed Technologies LiteSpeed Cache allows Authentication Bypass.This issue affects LiteSpeed Cache: from n/a before 6.5.0.1.
Available Exploits
LiteSpeed Cache <= 6.4.1 - Sensitive Information Exposure
The LiteSpeed Cache plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 6.4.1 through the debug.log file that is publicly exposed. This makes it possible for unauthenticated attackers to view potentially sensitive information contained in the exposed log file. The log file may contain user cookies making it possible for an attacker to log in with any session that is actively valid and exposed in the log file. Note: the debug feature must be enabled for this to be a concern and this feature is disabled by default.
References:
- https://www.wordfence.com/threat-intel/vulnerabilities/wordpress-plugins/litespeed-cache/litespeed-cache-641-unauthenticated-sensitive-information-exposure-via-log-files
- https://github.com/absholi7ly/CVE-2024-44000-LiteSpeed-Cache
- https://github.com/gbrsh/CVE-2024-44000
- https://thehackernews.com/2024/09/critical-security-flaw-found-in.html
- https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/wp_litespeed_cookie_theft.rb
Related News
Affected Products
Affected Versions:
Affected Versions:
WordPress Vulnerability
Identified and analyzed by Wordfence
Software Type
Patch Status
Published
Software Details
Software Name
LiteSpeed Cache
Software Slug
litespeed-cache
Affected Versions
Patched Versions
Remediation
Update to version 6.5.0.1, or a newer patched version
© Defiant Inc. Data provided by Wordfence.