The W3SPEEDSTER plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 7.26 via the 'script' parameter of the hookBeforeStartOptimization() function. This is due to the plugin passing user supplied input to eval(). This makes it possible for authenticated attackers, with Administrator-level access and above, to execute code on the server.
Metrics
Affected Vendors & Products
References
History
Wed, 30 Oct 2024 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 30 Oct 2024 11:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The W3SPEEDSTER plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 7.26 via the 'script' parameter of the hookBeforeStartOptimization() function. This is due to the plugin passing user supplied input to eval(). This makes it possible for authenticated attackers, with Administrator-level access and above, to execute code on the server. | |
Title | W3SPEEDSTER <= 7.26 - Authenticated (Administrator+) Remote Code Execution | |
Weaknesses | CWE-95 | |
References |
| |
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-10-30T11:00:59.962Z
Updated: 2024-10-30T14:04:13.997Z
Reserved: 2024-09-06T13:43:10.915Z
Link: CVE-2024-8512
Vulnrichment
Updated: 2024-10-30T13:54:28.030Z
NVD
Status : Awaiting Analysis
Published: 2024-10-30T11:15:15.963
Modified: 2024-11-01T12:57:03.417
Link: CVE-2024-8512
Redhat
No data.