WordPress plug-in LiteSpeed Cache vulnerable again
More than 6 million WordPress websites use the LiteSpeed Cache plug-in. A security vulnerability has now been closed once again.
(Image: Bild erstellt mit KI in Bing Designer durch heise online / dmk)
Attackers can exploit a vulnerability in the widely used WordPress plug-in LiteSpeed Cache and, in the worst case, gain access to websites as an admin. A secured version is available.
Admin attack
Security researchers from Patchstack warn of the vulnerability (CVE-2024-44000, severity rating pending) in an article. The plug-in is intended to speed up the loading of websites. According to the WordPress plug-in website, it is currently installed on more than 6 million websites created with the CMS.
Videos by heise
The security problem is that the debug logging feature logs all HTTP requests, including session cookies. According to the researchers, attackers can use this to gain access to an admin account, for example. In such a position, attackers can completely compromise websites.
The prerequisite for such an attack is that the debug function is active and the debug.log file has not been deleted. It is not clear from the researchers' description whether the feature is active by default. The developers state that they have closed the gap in LiteSpeed Cache 6.5.0.1.
Not the first time
Only recently, a "critical" vulnerability (CVE-2024-28000) in the plug-in made headlines. At this point, attackers were able to forge user IDs in order to gain administrative access to websites. It is currently not known whether there are already attacks on the gaps. It is also currently unknown how admins can detect attacks that have already taken place. However, it is obvious that admins should keep an eye out for unknown admin accounts and delete them.
(des)