The LiteSpeed Cache WordPress plugin before 4.4.4 does not properly verify that requests are coming from QUIC.cloud servers, allowing attackers to make requests to certain endpoints by using a specific X-Forwarded-For header value. In addition, one of the endpoint could be used to set CSS code if a setting is enabled, which will then be output in some pages without being sanitised and escaped. Combining those two issues, an unauthenticated attacker could put Cross-Site Scripting payloads in pages visited by users.
History

Thu, 22 May 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published: 2022-01-03T12:49:08.000Z

Updated: 2025-05-22T18:39:45.298Z

Reserved: 2021-01-14T00:00:00.000Z

Link: CVE-2021-24964

cve-icon Vulnrichment

Updated: 2024-08-03T19:49:14.371Z

cve-icon NVD

Status : Modified

Published: 2022-01-03T13:15:08.517

Modified: 2025-05-22T19:15:24.130

Link: CVE-2021-24964

cve-icon Redhat

No data.