First published: Mon Jan 03 2022(Updated: )
The LiteSpeed Cache WordPress plugin before 4.4.4 does not escape the qc_res parameter before outputting it back in the JS code of an admin page, leading to a Reflected Cross-Site Scripting
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
LiteSpeed Technologies LiteSpeed Cache | <4.4.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this LiteSpeed Cache WordPress plugin vulnerability is CVE-2021-24963.
CVE-2021-24963 is a vulnerability in the LiteSpeed Cache WordPress plugin before version 4.4.4 that leads to a Reflected Cross-Site Scripting (XSS) attack.
CVE-2021-24963 has a severity score of 4.8, which is considered medium severity.
The LiteSpeed Cache WordPress plugin versions up to (but not including) 4.4.4 are affected by CVE-2021-24963.
To fix CVE-2021-24963, you should update the LiteSpeed Cache WordPress plugin to version 4.4.4 or higher.