Page 3 of 21 results (0.007 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

The LiteSpeed Cache WordPress plugin before 4.4.4 does not properly verify that requests are coming from QUIC.cloud servers, allowing attackers to make requests to certain endpoints by using a specific X-Forwarded-For header value. In addition, one of the endpoint could be used to set CSS code if a setting is enabled, which will then be output in some pages without being sanitised and escaped. Combining those two issues, an unauthenticated attacker could put Cross-Site Scripting payloads in pages visited by users. El plugin LiteSpeed Cache de WordPress versiones anteriores a 4.4.4, no verifica correctamente que las peticiones proceden de servidores QUIC.cloud, permitiendo a atacantes realizar peticiones a determinados endpoints usando un valor de encabezado X-Forwarded-For específico. Además, uno de los endpoints podría ser usado para establecer código CSS si es habilitado un ajuste, que luego será emitido en algunas páginas sin ser saneado y escapado. • https://wpscan.com/vulnerability/e9966b3e-2eb9-4d70-8c18-6a829b4827cc • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

The LiteSpeed Cache WordPress plugin before 4.4.4 does not escape the qc_res parameter before outputting it back in the JS code of an admin page, leading to a Reflected Cross-Site Scripting El plugin LiteSpeed Cache de WordPress versiones anteriores a 4.4.4, no escapa el parámetro qc_res antes de devolverlo al código JS de una página de administración, conllevando a un ataque de tipo Cross-Site Scripting Reflejado The LiteSpeed Cache plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'qc_res' parameter in versions up to, and including, 4.4.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link. • https://plugins.trac.wordpress.org/changeset/2634373 https://wpscan.com/vulnerability/7f8b4275-7586-4e04-afd9-d12bdab6ba9b • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.0EPSS: 16%CPEs: 1EXPL: 3

Privilege Escalation in LiteSpeed Technologies OpenLiteSpeed web server version 1.7.8 allows attackers to gain root terminal access and execute commands on the host system. Una Escalada de privilegios en el servidor web LiteSpeed ??Technologies OpenLiteSpeed ??versión 1.7.8, permite a atacantes obtener acceso terminal root y ejecutar comandos en el sistema host • https://docs.unsafe-inline.com/0day/openlitespeed-web-server-1.7.8-command-injection-to-privilege-escalation-cve-2021-26758 https://github.com/litespeedtech/openlitespeed/issues/217 https://www.exploit-db.com/exploits/49556 • CWE-269: Improper Privilege Management •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

A cross-site scripting (XSS) vulnerability in the LiteSpeed Cache plugin before 3.6.1 for WordPress can be exploited via the Server IP setting. Una vulnerabilidad de tipo cross-site scripting (XSS) en el plugin LiteSpeed ??Cache versiones anteriores a 3.6.1 para WordPress puede ser explotada por medio de la configuración de IP del Servidor • https://wordpress.org/plugins/litespeed-cache/#developers https://www.litespeedtech.com/products/cache-plugins/wordpress-acceleration • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

The WebAdmin Console in OpenLiteSpeed before v1.6.5 does not strictly check request URLs, as demonstrated by the "Server Configuration > External App" screen. La WebAdmin Console en OpenLiteSpeed ??versiones anteriores a la versión v1.6.5 no comprueba estrictamente las URL de petición, como es demostrado por la pantalla "Server Configuration > External App". • https://drive.google.com/open?id=1pSciFEfjHp3kN8y5shy_zosJo7dje_fX https://forum.openlitespeed.org/threads/openlitespeed-v1-6-5-now-available.4047 • CWE-20: Improper Input Validation •