1.0 Introduction
Recently, a critical vulnerability in the LiteSpeed Cache plugin for WordPress known as CVE-2024-44000 has been identified that could potentially be exploited to gain control over affect websites.
2.0 Impact
A successful exploitation of this vulnerability could grant attackers complete control over the affected website, allowing them to hijack user sessions, gain unauthorized access to sensitive data, and upload and execute malicious code.
3.0 Affected Products
- LiteSpeed Cache versions prior to 6.5.0.1 or later
4.0 Recommendations
CyberSecurity Malaysia encourages users and administrators to review the LiteSpeed Cache Guides and apply the necessary updates.
Kindly refer to the following URL: https://patchstack.com/articles/critical-account-takeover-vulnerability-patched-in-litespeed-cache-plugin/
Generally, we advise users of this device to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.
For further enquiries, please contact Cyber999 through the following channels:
E-mail: cyber999[at]cybersecurity.my
Phone: 1-300-88-2999 (monitored during business hours)
Mobile: +60 19 2665850 (24x7 call incident reporting)
Business Hours: Mon - Fri 08:30 -17:30 MYT
Web: https://www.mycert.org.my
5.0 References