The SiteGround Optimizer plugin for WordPress is vulnerable to authorization bypass leading to Remote Code Execution and Local File Inclusion in versions up to, and including, 5.0.12 due to incorrect use of an access control attribute on the switch_php function called via the /switch-php REST API route. This allows attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
History

Wed, 16 Oct 2024 18:15:00 +0000

Type Values Removed Values Added
First Time appeared Siteground
Siteground speed Optimizer
CPEs cpe:2.3:a:siteground:speed_optimizer:*:*:*:*:*:*:*:*
Vendors & Products Siteground
Siteground speed Optimizer
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 16 Oct 2024 07:00:00 +0000

Type Values Removed Values Added
Description The SiteGround Optimizer plugin for WordPress is vulnerable to authorization bypass leading to Remote Code Execution and Local File Inclusion in versions up to, and including, 5.0.12 due to incorrect use of an access control attribute on the switch_php function called via the /switch-php REST API route. This allows attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
Title SiteGround Optimizer <= 5.0.12 - Missing Authorization
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-10-16T06:43:33.613Z

Updated: 2024-10-16T18:05:28.431Z

Reserved: 2024-10-15T18:25:59.186Z

Link: CVE-2019-25217

cve-icon Vulnrichment

Updated: 2024-10-16T17:53:54.788Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-10-16T07:15:07.030

Modified: 2024-10-16T16:38:14.557

Link: CVE-2019-25217

cve-icon Redhat

No data.