Описание
The parameters $cache_path, $wp_cache_debug_ip, $wp_super_cache_front_page_text, $cache_scheduled_time, $cached_direct_pages used in the settings of WP Super Cache WordPress plugin before 1.7.3 result in RCE because they allow input of '$' and '\n'. This is due to an incomplete fix of CVE-2021-24209.
Ссылки
- ExploitThird Party Advisory
- ExploitThird Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 1.7.3 (исключая)
cpe:2.3:a:automattic:wp_super_cache:*:*:*:*:*:wordpress:*:*
EPSS
Процентиль: 80%
0.01432
Низкий
7.2 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-94
CWE-78
Связанные уязвимости
CVSS3: 7.2
github
больше 3 лет назад
The parameters $cache_path, $wp_cache_debug_ip, $wp_super_cache_front_page_text, $cache_scheduled_time, $cached_direct_pages used in the settings of WP Super Cache WordPress plugin before 1.7.3 result in RCE because they allow input of '$' and '\n'. This is due to an incomplete fix of CVE-2021-24209.
EPSS
Процентиль: 80%
0.01432
Низкий
7.2 High
CVSS3
6.5 Medium
CVSS2
Дефекты
CWE-94
CWE-78