LiteSpeed Cache <= 6.4.1 - Unauthenticated Sensitive Information Exposure via Log Files

7.5
Insertion of Sensitive Information into Log File
CVE CVE-2024-44000
CVSS 7.5 (High)
Publicly Published September 5, 2024
Last Updated September 5, 2024
Researcher Rafie Muhammad - Patchstack

Description

The LiteSpeed Cache plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 6.4.1 through the debug.log file that is publicly exposed. This makes it possible for unauthenticated attackers to view potentially sensitive information contained in the exposed log file. The log file may contain user cookies making it possible for an attacker to log in with any session that is actively valid and exposed in the log file. Note: the debug feature must be enabled for this to be a concern and this feature is disabled by default.

References

Share

Vulnerability Details for LiteSpeed Cache

Software Type Plugin
Software Slug litespeed-cache (view on wordpress.org)
Patched? Yes
Remediation Update to version 6.5.0.1, or a newer patched version
Affected Version
  • <= 6.4.1
Patched Version
  • 6.5.0.1

Did you know Wordfence Intelligence provides free personal and commercial API access to our comprehensive WordPress vulnerability database, along with a free webhook integration to stay on top of the latest vulnerabilities added and updated in the database? Get started today!

Learn more

Want to get notified of the latest vulnerabilities that may affect your WordPress site?
Install Wordfence on your site today to get notified immediately if your site is affected by a vulnerability that has been added to our database.

Get Wordfence

The Wordfence Intelligence WordPress vulnerability database is completely free to access and query via API. Please review the documentation on how to access and consume the vulnerability data via API.

Documentation