Injection vulnerabilities in popular WordPress plugin could expose credentials, allow administrator access
Jessica Haworth October 15, 2021 at 12:41 UTC
Updated: October 15, 2021 at 13:55 UTC
Fastest Cache is used by over a million websites
Vulnerabilities in a popular WordPress Fastest Cache plugin could allow an attacker to access credentials and take control of an administrator account.
The security flaws in the extension, which has more than one million active downloads, were discovered during an internal audit of the software by Jetpack Security.
The first flaw, an SQL injection vulnerability that has a CVSS score of 7.7, could allow attackers to access privileged information from the database of an affected site, such as names of companies. user and hashed passwords.
This SQL injection bug can only be exploited if the classic-editor plugin is also installed and activated on the site.
Researchers also discovered a cross-site scripting (XSS) bug via a cross-site request forgery (CSRF) vulnerability that has a CVSS score of 9.6. Exploitation of this vulnerability would allow an attacker to perform the same actions that his victim, potentially an administrator user, had privileges to perform.
Learn more about the latest WordPress security news.
In a blog post, Jetpack researchers provided more technical details on how they were able to demonstrate the attacks. They credited the researcher Marc Montpas with the initial finding.
A timeline also showed that it took less than five weeks from the first contact with the supplier for them to resolve the issue.
Fastest Cache users are advised to update to the latest version 0.9.5 to protect against these various vulnerabilities.
“We recommend that you check which version of the WP Fastest Cache plugin your site is using, and if it’s lower than 0.9.5, update it ASAP!” the blog reads.
YOU CAN LIKE Git providers revoke weak keys generated in vulnerable GitKraken crypto library