WordPress Plugin Vulnerabilities
LiteSpeed Cache < 6.4 - Unauthenticated Privilege Escalation
Description
The plugin is vulnerable to privilege escalations due to the plugin not properly restricting the role simulation functionality allowing a user to set their current ID to that of an administrator, if they have access to a valid hash which can be found in the debug logs or brute forced. This makes it possible for unauthenticated attackers to spoof their user ID to that of an administrator, and then create a new user account with the administrator role utilizing the /wp-json/wp/v2/users REST API endpoint. In some environments, the crawler may be disabled making this a non-exploitable issue in those instances.
Affects Plugins
References
Classification
Type
PRIVESC
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
John Blackbourn
Verified
No
WPVDB ID
Timeline
Publicly Published
2024-08-21 (about 1 year ago)
Added
2024-08-21 (about 1 year ago)
Last Updated
2024-08-21 (about 1 year ago)