A concerning security vulnerability within a widely-used WordPress plugin, LiteSpeed Cache, has been detected. Tracked as CVE-2023-40000, this vulnerability has raised alarms due to its potential to enable unauthenticated users to escalate their privileges, posing significant risks to countless WordPress websites.
CVE-2023-40000 Vulnerability Unveiled
Discovered and disclosed by Patchstack researcher Rafie Muhammad, CVE-2023-40000 exposes a critical flaw in LiteSpeed Cache plugin versions prior to 5.7.0.1. This vulnerability, classified as an unauthenticated site-wide stored cross-site scripting (XSS) vulnerability, allows malicious actors to exploit inadequate user input sanitization and escaping output mechanisms. With a single HTTP request, unauthorized users could potentially compromise sensitive information and elevate their permissions on affected WordPress sites.
Root Cause Analysis
The root cause of CVE-2023-40000 lies in the function update_cdn_status() within the LiteSpeed Cache plugin. Insufficient input sanitization and output escaping pave the way for exploitation, as confirmed by cybersecurity experts. This oversight, present even in default installations, underscores the critical need for robust security measures in plugin development.
Implications and Scope of CVE-2023-40000
LiteSpeed Cache, designed to enhance website performance, has a staggering five million installations globally. The widespread adoption of this plugin amplifies the impact of the disclosed vulnerability. The latest version of the plugin is 6.1, released on February 5, 2024, and WordPress users are urged to promptly update their installations.
Not surprisingly, CVE-2023-40000 is not the first security lapse identified in the LiteSpeed Cache plugin. Just four months prior, Wordfence uncovered another XSS vulnerability (CVE-2023-4372) in version 5.7. This earlier flaw was attributed to inadequate input sanitization and output escaping on user-supplied attributes.
Just yesterday, we reported another recently disclosed WordPress vulnerability: CVE-2024-1071 in Ultimate Member. The flaw was discovered by security researcher Christiaan Swiers, with a CVSS score of 9.8 out of 10. In light of these revelations, WordPress website administrators must sustain timely updates and diligent monitoring of plugin vulnerabilities.