LiteSpeed Cache 5.7 Fixes XSS Vulnerability

LiteSpeed Cache Plugin Patches XSS Vulnerability in Version 5.7

The LiteSpeed Cache plugin, which is used on over four million WordPress sites, has recently patched a cross-site scripting (XSS) vulnerability in its version 5.7. LiteSpeed Cache is a popular plugin that offers site acceleration capabilities, server-level caching, and a range of optimization features. It is compatible with WordPress multisite and other widely-used plugins like WooCommerce, bbPress, and Yoast SEO, contributing to its widespread adoption.

The XSS vulnerability was discovered by Wordfence security researcher István Márton, who responsibly disclosed it to the LiteSpeed Cache Team on August 14, 2023. According to the advisory released by Wordfence, the vulnerability could allow an attacker to inject malicious scripts using the ‘esi’ shortcode. This vulnerability existed in versions up to and including 5.6 due to insufficient input sanitization and output escaping on user-supplied attributes. As a result, authenticated attackers with contributor-level and above permissions could inject arbitrary web scripts into pages that would execute whenever a user accessed an injected page.

Márton also highlighted another important point regarding previous versions of WordPress. These versions contained a vulnerability that allowed shortcodes supplied by unauthenticated commenters to be rendered in certain configurations. All versions since WordPress 5.9 were affected by this vulnerability. If users did not update to a patched version of WordPress, unauthenticated attackers could exploit this cross-site scripting vulnerability on vulnerable installations.

To address this issue, LiteSpeed Cache promptly released version 5.7, which included the necessary patch for the XSS vulnerability. The update was made available on WordPress.org on October 10. However, despite being available for two weeks, only 30% of LiteSpeed Cache users have upgraded to the latest version.

It is crucial for LiteSpeed Cache users to update to the patched version (5.7) as soon as possible to protect their websites from potential attacks. By updating, users can ensure that their sites are no longer vulnerable to the XSS vulnerability. Wordfence has provided a detailed advisory on this issue, including a comprehensive technical analysis, for users who want more information.

In conclusion, the LiteSpeed Cache plugin has addressed a significant security concern by patching an XSS vulnerability in version 5.7. This vulnerability could have allowed authenticated attackers to inject malicious scripts into pages, potentially compromising the security of affected websites. LiteSpeed Cache users are strongly advised to update to the latest version to ensure their sites are protected. Additionally, it is essential for WordPress users to keep their installations up to date with the latest patches to avoid potential vulnerabilities. By staying vigilant and proactive in maintaining website security, users can safeguard their online presence and protect their visitors from potential threats.

Stay in Touch

spot_img

Related Articles