LiteSpeed Cache plugin has XSS vulnerability, 4M WordPress Sites exposed
Take action: If you are using LiteSpeed Cache for Wordpress, update it to latest version as soon as possible. The XSS vulnerability isn't immediately terrible, but if left exposed will be a low hanging fruit for simple automated attacks. Don't let hackers abuse your site, the plugin update is very easy.
Learn More
A vulnerability has been identified in the LiteSpeed Cache plugin for WordPress, which is extensively utilized with over 4 million active installations.
The flaw, tracked as CVE-2023-40000 discovered by the Patchstack team is an unauthenticated site-wide stored XSS (cross-site scripting), due to inadequate input sanitization and output escaping within the plugin's code. It could potentially enable attackers to gain unauthorized access to sensitive information or escalate their privileges on the compromised WordPress sites through a HTTP request. Additionally, improper access control was identified on one of its REST API endpoints, specifically the cdn_status endpoint, which is related to the update_cdn_status function and permits unauthenticated users to exploit this vulnerability.
The vulnerability was remedied in version 5.7.0.1 of the LiteSpeed Cache plugin. Users of this plugin are strongly advised to update to the latest version as a precautionary measure. Developers are encouraged to ensure proper input sanitization and output escaping in their programming practices.