WordPress Plugin Vulnerabilities
WP Super Cache < 1.7.3 - Authenticated Remote Code Execution
Description
The parameters $cache_path, $wp_cache_debug_ip, $wp_super_cache_front_page_text, $cache_scheduled_time, $cached_direct_pages used in the plugin settings result in RCE because they allow input of "$" and "\n". This is due to an incomplete fix of CVE-2021-24209.
You can run the command directly to "https://target/wp-content/wp-cache-config.php".
Proof of Concept
Affects Plugins
References
Classification
Type
RCE
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
NGA
Submitter
NGA
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2021-05-14 (about 4 years ago)
Added
2021-05-14 (about 4 years ago)
Last Updated
2021-05-15 (about 4 years ago)