Description
The LiteSpeed Cache plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via URLs in all versions up to, and including, 7.5.0.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Published: 2025-10-29
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Reflected Cross‑Site Scripting (unrestricted script injection)
Action: Apply Patch
AI Analysis

Impact

The LiteSpeed Cache plugin for WordPress contains a reflected cross‑site scripting flaw caused by inadequate sanitization of user input and missing output escaping. The vulnerability allows an attacker to embed arbitrary JavaScript into a page that will execute when a victim follows a crafted link. Because the flaw is triggered solely by incoming URLs, authentication is not required and any eligible user of a vulnerable WordPress site can be targeted.

Affected Systems

All WordPress sites that run LiteSpeed Cache version 7.5.0.1 or older are affected. The issue is located within the LiteSpeed Cache plugin distributed by LiteSpeed Technologies and can impact any WordPress installation that has not upgraded beyond the mentioned version.

Risk and Exploitability

The CVSS score of 6.1 reflects moderate exploitability and potential impact. EPSS indicates a very low probability of exploitation (<1%), and the vulnerability is not listed in the CISA KEV catalog, suggesting it is not actively exploited in the wild as of the last update. The attack vector inferred is via a user clicking a maliciously crafted URL, which then causes the victim’s browser to execute injected script. No additional privileges or system access are required.

Generated by OpenCVE AI on April 22, 2026 at 00:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade LiteSpeed Cache to version 7.5.0.2 or later, the fix that removes the unfiltered query variables.
  • If an upgrade cannot be performed immediately, disable the LiteSpeed Cache plugin or remove the affected shortcode handling, preventing the vulnerable code path from executing.
  • Apply a web‑application firewall rule or enforce a strict content‑security‑policy that blocks inline scripts and restricts script sources, mitigating the risk of any residual injection.

Generated by OpenCVE AI on April 22, 2026 at 00:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Oct 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Litespeedtech
Litespeedtech litespeed Cache
Wordpress
Wordpress wordpress
Vendors & Products Litespeedtech
Litespeedtech litespeed Cache
Wordpress
Wordpress wordpress

Wed, 29 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 29 Oct 2025 09:45:00 +0000

Type Values Removed Values Added
Description The LiteSpeed Cache plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via URLs in all versions up to, and including, 7.5.0.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Title LiteSpeed Cache <= 7.5.0.1 - Reflected Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Litespeedtech Litespeed Cache
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:10:46.784Z

Reserved: 2025-10-28T20:45:41.236Z

Link: CVE-2025-12450

cve-icon Vulnrichment

Updated: 2025-10-29T13:59:28.388Z

cve-icon NVD

Status : Deferred

Published: 2025-10-29T10:15:36.903

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12450

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T00:45:04Z

Weaknesses