WordPress Plugin Vulnerabilities
SpeedyCache < 1.1.3 - Authenticated (Subscriber+) Server-Side Request Forgery
Description
The SpeedyCache – Cache, Optimization, Performance plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.1.2 via the speedycache_create_test_cache() function. This makes it possible for authenticated attackers, subscriber-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services.
Affects Plugins
References
Classification
Type
SSRF
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Yuchen Ji
Verified
No
WPVDB ID
Timeline
Publicly Published
2023-12-04 (about 2 years ago)
Added
2023-12-08 (about 2 years ago)
Last Updated
2023-12-08 (about 2 years ago)