WordPress Plugin Vulnerabilities

WP Super Cache < 1.7.2 - Authenticated Remote Code Execution (RCE)

Description

The plugin was affected by an authenticated (admin+) RCE in the settings page due to input validation failure and weak $cache_path check in the WP Super Cache Settings -> Cache Location option. Direct access to the wp-cache-config.php file is not prohibited, so this vulnerability can be exploited for a web shell injection.

Another possible attack vector: from XSS (via another plugin affected by XSS) to RCE.

Proof of Concept

Affects Plugins

Fixed in 1.7.2

References

Classification

Type
RCE
OWASP top 10
CWE
CVSS

Miscellaneous

Original Researcher
m0ze
Verified
Yes

Timeline

Publicly Published
2021-03-16 (about 4 years ago)
Added
2021-03-16 (about 4 years ago)
Last Updated
2021-05-14 (about 4 years ago)

Other