The LiteSpeed Cache WordPress plugin before 4.4.4 does not properly verify that requests are coming from QUIC.cloud servers, allowing attackers to make requests to certain endpoints by using a specific X-Forwarded-For header value. In addition, one of the endpoint could be used to set CSS code if a setting is enabled, which will then be output in some pages without being sanitised and escaped. Combining those two issues, an unauthenticated attacker could put Cross-Site Scripting payloads in pages visited by users.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: WPScan
Published: 2022-01-03T12:49:08
Updated: 2024-08-03T19:49:14.371Z
Reserved: 2021-01-14T00:00:00
Link: CVE-2021-24964
Vulnrichment
No data.
NVD
Status : Modified
Published: 2022-01-03T13:15:08.517
Modified: 2024-11-21T05:54:05.820
Link: CVE-2021-24964
Redhat
No data.