The LiteSpeed Cache WordPress plugin before 4.4.4 does not properly verify that requests are coming from QUIC.cloud servers, allowing attackers to make requests to certain endpoints by using a specific X-Forwarded-For header value. In addition, one of the endpoint could be used to set CSS code if a setting is enabled, which will then be output in some pages without being sanitised and escaped. Combining those two issues, an unauthenticated attacker could put Cross-Site Scripting payloads in pages visited by users.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 22 May 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published:

Updated: 2025-05-22T18:39:45.298Z

Reserved: 2021-01-14T00:00:00.000Z

Link: CVE-2021-24964

cve-icon Vulnrichment

Updated: 2024-08-03T19:49:14.371Z

cve-icon NVD

Status : Modified

Published: 2022-01-03T13:15:08.517

Modified: 2025-05-22T19:15:24.130

Link: CVE-2021-24964

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.