The LiteSpeed Cache WordPress plugin before 4.4.4 does not properly verify that requests are coming from QUIC.cloud servers, allowing attackers to make requests to certain endpoints by using a specific X-Forwarded-For header value. In addition, one of the endpoint could be used to set CSS code if a setting is enabled, which will then be output in some pages without being sanitised and escaped. Combining those two issues, an unauthenticated attacker could put Cross-Site Scripting payloads in pages visited by users.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 22 May 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2025-05-22T18:39:45.298Z
Reserved: 2021-01-14T00:00:00.000Z
Link: CVE-2021-24964
Updated: 2024-08-03T19:49:14.371Z
Status : Modified
Published: 2022-01-03T13:15:08.517
Modified: 2025-05-22T19:15:24.130
Link: CVE-2021-24964
No data.
OpenCVE Enrichment
No data.
Weaknesses