WordPress Plugin Vulnerabilities
WP Super Cache < 1.7.2 - Authenticated Remote Code Execution (RCE)
Description
The plugin was affected by an authenticated (admin+) RCE in the settings page due to input validation failure and weak $cache_path check in the WP Super Cache Settings -> Cache Location option. Direct access to the wp-cache-config.php file is not prohibited, so this vulnerability can be exploited for a web shell injection.
Another possible attack vector: from XSS (via another plugin affected by XSS) to RCE.
Proof of Concept
Affects Plugins
References
Classification
Type
RCE
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
m0ze
Verified
Yes
WPVDB ID
Timeline
Publicly Published
2021-03-16 (about 4 years ago)
Added
2021-03-16 (about 4 years ago)
Last Updated
2021-05-14 (about 4 years ago)