WordPress Plugin Vulnerabilities

WP Super Cache < 1.7.3 - Authenticated Remote Code Execution

Description

The parameters $cache_path, $wp_cache_debug_ip, $wp_super_cache_front_page_text, $cache_scheduled_time, $cached_direct_pages used in the plugin settings result in RCE because they allow input of "$" and "\n". This is due to an incomplete fix of CVE-2021-24209.

You can run the command directly to "https://target/wp-content/wp-cache-config.php".

Proof of Concept

Affects Plugins

Fixed in 1.7.3

References

Classification

Type
RCE
OWASP top 10
CWE
CVSS

Miscellaneous

Original Researcher
NGA
Submitter
NGA
Verified
Yes

Timeline

Publicly Published
2021-05-14 (about 4 years ago)
Added
2021-05-14 (about 4 years ago)
Last Updated
2021-05-15 (about 4 years ago)

Other