First published: Mon Apr 05 2021(Updated: )
The WP Super Cache WordPress plugin before 1.7.2 was affected by an authenticated (admin+) RCE in the settings page due to input validation failure and weak $cache_path check in the WP Super Cache Settings -> Cache Location option. Direct access to the wp-cache-config.php file is not prohibited, so this vulnerability can be exploited for a web shell injection.
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Automattic Wp Super Cache | <1.7.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-24209 is a vulnerability in the WP Super Cache WordPress plugin before version 1.7.2.
CVE-2021-24209 has a severity rating of critical with a score of 7.2.
CVE-2021-24209 allows authenticated (admin+) remote code execution (RCE) on the WP Super Cache plugin via the settings page.
To fix CVE-2021-24209, update the WP Super Cache plugin to version 1.7.2 or later.
More information about CVE-2021-24209 can be found in the references: [link1], [link2].