The WP Super Cache WordPress plugin before 1.7.2 was affected by an authenticated (admin+) RCE in the settings page due to input validation failure and weak $cache_path check in the WP Super Cache Settings -> Cache Location option. Direct access to the wp-cache-config.php file is not prohibited, so this vulnerability can be exploited for a web shell injection.
References
Link | Resource |
---|---|
https://plugins.trac.wordpress.org/changeset/2496238/wp-super-cache | Patch Third Party Advisory |
https://m0ze.ru/vulnerability/[2021-03-13]-[WordPress]-[CWE-94]-WP-Super-Cache-WordPress-Plugin-v1.7.1.txt | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/733d8a02-0d44-4b78-bbb2-37e447acd2f3 | Exploit Third Party Advisory |
Configurations
Information
Published : 2021-04-05 12:15
Updated : 2021-05-04 08:02
NVD link : CVE-2021-24209
Mitre link : CVE-2021-24209
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
automattic
- wp_super_cache