1.0 Introduction
Recently, WordPress release security updates for a critical vulnerability, identified as CVE-2024-28000 in WordPress LiteSpeed Cache Plugin that could be exploited to gain unauthorized access to vulnerable websites.
2.0 Impact
This vulnerability could allow unauthenticated attacker can gain administrator level access to vulnerable websites. An unauthenticated attacker can exploit this flaw to spoof their user ID and register as an administrator level user effectively gaining control of the WordPress site.
3.0 Affected Products
- All versions of LiteSpeed Cache prior to 6.4
4.0 Recommendations
CyberSecurity Malaysia highly recommends users of these applications to upgrade to the latest version of the affected products:
Kindly refer to the URL for more information: https://plugins.trac.wordpress.org/changeset/3135111/litespeed-cache/trunk
Generally, CyberSecurity Malaysia advises the users of this software to be updated with the latest security announcements by the vendor and follow best practice security policies to determine which updates should be applied.
For further enquiries, please contact Cyber999 through the following channels:
E-mail: cyber999[at]cybersecurity.my
Phone: 1-300-88-2999 (monitored during business hours)
Fax: +603 - 8008 7000 (Office Hours)
Mobile: +60 19 2665850 (24x7 call incident reporting)
SMS: CYBER999 REPORT EMAIL COMPLAINT to 15888
Business Hours: Mon - Fri 08:30 -17:30 MYT
Web: https://www.mycert.org.my
5.0 References
- https://plugins.trac.wordpress.org/changeset/3135111/litespeed-cache/trunk
- https://www.bleepingcomputer.com/news/security/litespeed-cache-bug-exposes-millions-of-wordpress-sites-to-takeover-attacks/
- https://patchstack.com/database/vulnerability/litespeed-cache/wordpress-litespeed-cache-plugin-6-3-0-1-unauthenticated-privilege-escalation-vulnerability?_s_id=cve
- https://patchstack.com/articles/critical-privilege-escalation-in-litespeed-cache-plugin-affecting-5-million-sites?_s_id=cve
- https://nvd.nist.gov/vuln/detail/CVE-2024-28000