Cyber Security

LiteSpeed Cache Plugin Flaw Let Attackers Inject Malicious Code, 5M+ Sites Impacted

The popular LiteSpeed Cache plugin for WordPress has been found vulnerable to a Cross-Site Request Forgery (CSRF) attack, which could potentially impact over 5 million websites.

The flaw, identified as CVE-2024-3246, was publicly disclosed on July 23, 2024, and has been assigned a CVSS score of 6.1, categorizing it as a medium-severity vulnerability.

CVE-2024-3246 – LiteSpeed Cache Plugin Flaw

According to the Wordfence report, the vulnerability, discovered by security researcher Krzysztof Zając from CERT PL, affects all versions of the LiteSpeed Cache plugin up to and including 6.2.0.1.

The flaw stems from missing or incorrect nonce validation, a critical security measure to prevent CSRF attacks.

This oversight allows unauthenticated attackers to update the token setting and inject malicious JavaScript code via a forged request.

For the attack to be successful, the attacker must trick a site administrator into acting, such as clicking on a malicious link.

Join our free webinar to learn about combating slow DDoS attacks, a major threat today.

Vulnerability Details:

Affected Version<= 6.2.0.1
Patched Version6.3

Impact and Mitigation

Given the widespread use of the LiteSpeed Cache plugin, the potential impact of this vulnerability is substantial. If exploited, attackers could inject malicious code, leading to various security issues, including data theft, site defacement, and exploitation of site visitors.

The vulnerability has been patched in version 6.3 of the LiteSpeed Cache plugin. Website administrators are strongly advised to immediately update their plugins to the latest version to mitigate the risk.

The update can be found on the official WordPress plugin repository. Wordfence Intelligence, which tracks vulnerabilities in WordPress plugins, emphasizes the importance of timely updates.

“This vulnerability highlights the critical need for regular plugin updates and vigilance in website security management,” a spokesperson from Wordfence stated.

As the digital landscape continues to evolve, ensuring the security of web applications remains paramount.

The discovery of CVE-2024-3246 is a stark reminder of the vulnerabilities within widely used software and the importance of proactive security measures.

Protect Your Business Emails From Spoofing, Phishing & BEC with AI-Powered Security | Free Demo

Dhivya

Divya is a Senior Journalist at Cyber Security news covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

New Chaosbot Leveraging CiscoVPN and Active Directory Passwords to Execute Network Commands

ChaosBot surfaced in late September 2025 as a sophisticated Rust-based backdoor targeting enterprise networks. Initial…

15 hours ago

Threat Actors Exploiting SonicWall SSL VPN Devices in Wild to Deploy Akira Ransomware

Threat actors have reemerged in mid-2025 leveraging previously disclosed vulnerabilities in SonicWall SSL VPN appliances…

15 hours ago

Nanoprecise partners with AccuKnox to strengthen its Zero Trust Cloud Security and Compliance Posture

Menlo Park, USA, October 10th, 2025, CyberNewsWire AccuKnox, a leader in Zero Trust Cloud Native…

16 hours ago

175 Malicious npm Packages With 26,000 Downloads Attacking Technology, and Energy Companies Worldwide

Socket's Threat Research Team has uncovered a sophisticated phishing campaign involving 175 malicious npm packages…

17 hours ago

RondoDox Botnet Exploits 50+ Vulnerabilities to Attack Routers, CCTV Systems and Web Servers

Since its emergence in early 2025, RondoDox has rapidly become one of the most pervasive…

17 hours ago

Microsoft Defender Incorrectly Flags SQL Server Software as End-of-life

Microsoft Defender for Endpoint is incorrectly flagging specific versions of SQL Server as having reached…

19 hours ago