WordPress Plugin Vulnerabilities

LiteSpeed Cache < 4.4.4 - Admin+ Reflected Cross-Site Scripting

Description

The plugin does not escape the qc_res parameter before outputting it back in the JS code of an admin page, leading to a Reflected Cross-Site Scripting

Proof of Concept

As admin, enter the following payload in the Domain Key setting of the plugin: </script><script>

Then open https://example.com/wp-admin/admin.php?page=litespeed-general&qc_res=</script><script>alert(/XSS/)</script>&domain_hash=541a0e1df04a2a5b7e4bd3472ff596cc

Affects Plugins

Fixed in 4.4.4

References

Classification

Type
XSS
CWE
CVSS

Miscellaneous

Original Researcher
Emil Kylander
Submitter
Emil Kylander
Submitter website
Submitter twitter
Verified
Yes

Timeline

Publicly Published
2021-11-30 (about 2 years ago)
Added
2021-11-30 (about 2 years ago)
Last Updated
2022-04-09 (about 2 years ago)

Other