The Speed Booster Pack âš¡ PageSpeed Optimization Suite WordPress plugin before 4.2.0 did not validate its caching_exclude_urls and caching_include_query_strings settings before outputting them in a PHP file, which could lead to RCE
References
Link | Resource |
---|---|
https://m0ze.ru/vulnerability/[2021-05-10]-[WordPress]-[CWE-94]-Speed-Booster-Pack-WordPress-Plugin-v4.2.0-beta.txt | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/945d6d2e-fa25-42c0-a7b4-b1794732a0df | Exploit Third Party Advisory |
Configurations
Information
Published : 2021-08-02 04:15
Updated : 2021-08-09 17:55
NVD link : CVE-2021-24430
Mitre link : CVE-2021-24430
JSON object : View
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
Products Affected
optimocha
- speed_booster_pack