Cyber Security

LiteSpeed Cache Plugin Flaw Let Attackers Inject Malicious Code, 5M+ Sites Impacted

The popular LiteSpeed Cache plugin for WordPress has been found vulnerable to a Cross-Site Request Forgery (CSRF) attack, which could potentially impact over 5 million websites.

The flaw, identified as CVE-2024-3246, was publicly disclosed on July 23, 2024, and has been assigned a CVSS score of 6.1, categorizing it as a medium-severity vulnerability.

CVE-2024-3246 – LiteSpeed Cache Plugin Flaw

According to the Wordfence report, the vulnerability, discovered by security researcher Krzysztof Zając from CERT PL, affects all versions of the LiteSpeed Cache plugin up to and including 6.2.0.1.

The flaw stems from missing or incorrect nonce validation, a critical security measure to prevent CSRF attacks.

This oversight allows unauthenticated attackers to update the token setting and inject malicious JavaScript code via a forged request.

For the attack to be successful, the attacker must trick a site administrator into acting, such as clicking on a malicious link.

Join our free webinar to learn about combating slow DDoS attacks, a major threat today.

Vulnerability Details:

Affected Version<= 6.2.0.1
Patched Version6.3

Impact and Mitigation

Given the widespread use of the LiteSpeed Cache plugin, the potential impact of this vulnerability is substantial. If exploited, attackers could inject malicious code, leading to various security issues, including data theft, site defacement, and exploitation of site visitors.

The vulnerability has been patched in version 6.3 of the LiteSpeed Cache plugin. Website administrators are strongly advised to immediately update their plugins to the latest version to mitigate the risk.

The update can be found on the official WordPress plugin repository. Wordfence Intelligence, which tracks vulnerabilities in WordPress plugins, emphasizes the importance of timely updates.

“This vulnerability highlights the critical need for regular plugin updates and vigilance in website security management,” a spokesperson from Wordfence stated.

As the digital landscape continues to evolve, ensuring the security of web applications remains paramount.

The discovery of CVE-2024-3246 is a stark reminder of the vulnerabilities within widely used software and the importance of proactive security measures.

Protect Your Business Emails From Spoofing, Phishing & BEC with AI-Powered Security | Free Demo

Dhivya

Divya is a Senior Journalist at Cyber Security news covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Recent Posts

Hackers Actively Exploiting Critical Exchange & SharePoint Server Vulnerabilities

Microsoft has warned organizations worldwide that threat actors are ramping up their exploitation of critical…

6 hours ago

How to Implementing SOAR To Reduce Incident Response Time Effectively

In the modern digital landscape, organizations are constantly challenged by an ever-increasing volume of security…

12 hours ago

How To Prioritize Threat Intelligence Alerts In A High-Volume SOC

In today's rapidly evolving cyber threat landscape, Security Operations Centers (SOCs) face an unprecedented challenge:…

12 hours ago

Detecting And Responding To New Nation-State Persistence Techniques

Nation-state cyber threats have evolved dramatically over the past decade, with attackers employing increasingly sophisticated…

12 hours ago

Leaked KeyPlug Malware Infrastructure Contains Exploit Scripts to Hack Fortinet Firewall and VPN

A server briefly linked to the notorious KeyPlug malware has inadvertently exposed a comprehensive arsenal…

16 hours ago

How Generative AI is Changing Red Team Tactics

The rapid evolution of generative AI has fundamentally transformed the landscape of cybersecurity, especially in…

19 hours ago