The Speed Booster Pack âš¡ PageSpeed Optimization Suite WordPress plugin before 4.2.0 did not validate its caching_exclude_urls and caching_include_query_strings settings before outputting them in a PHP file, which could lead to RCE
References
Configurations
History
10 Aug 2021, 00:55
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-94 | |
CVSS |
v2 : v3 : |
v2 : 6.5
v3 : 7.2 |
CPE | cpe:2.3:a:optimocha:speed_booster_pack:*:*:*:*:*:wordpress:*:* | |
References | (MISC) https://wpscan.com/vulnerability/945d6d2e-fa25-42c0-a7b4-b1794732a0df - Exploit, Third Party Advisory | |
References | (MISC) https://m0ze.ru/vulnerability/[2021-05-10]-[WordPress]-[CWE-94]-Speed-Booster-Pack-WordPress-Plugin-v4.2.0-beta.txt - Exploit, Third Party Advisory |
02 Aug 2021, 11:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-08-02 11:15
Updated : 2024-02-04 21:47
NVD link : CVE-2021-24430
Mitre link : CVE-2021-24430
CVE.ORG link : CVE-2021-24430
JSON object : View
Products Affected
optimocha
- speed_booster_pack
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')