WordPress Plugin WP Super Cache Vulnerability Affects Over 2 Million Sites

March 17, 2021
WordPress Plugin WP Super Cache Vulnerability Affects Over 2 Million Sites

WordPress Plugin WP Super Cache Vulnerability Affects Over 2 Million Sites

A vulnerability was found in WP Super Cache by Automattic. It’s a low severity vulnerability that could permit a hacker to upload and execute malicious code, typically with the goal to gain control of the site.

Remote Code Execution Vulnerability (RCE)

A flaw was revealed today that exposes users of WP Super Cache to an authenticated remote code execution (RCE) vulnerability.

Remote Code Execution is an exploit that allows an attacker to take advantage of a flaw that can allow them to upload and run malicious code.

The typical intent is to upload and execute PHP code that then allows them to do things like installing secondary, access and make changes to the database, and attain admin level control of the site.

When an attacker has admin-level control the site is viably heavily influenced by them.

As indicated by the glossary published on Wordfence.com, this is the meaning of a Remote Code Execution

“Remote Code Execution (RCE) occurs when an attacker is able to upload code to your website and execute it.

A bug in a PHP application may accept user input and evaluate it as PHP code. This could, for example, allow an attacker to tell the website to create a new file containing code that grants the attacker full access to your website.

When an attacker sends code to your web application and it is executed, granting the attacker access, they have exploited an RCE vulnerability. This is a very serious vulnerability because it is usually easy to exploit and grants full access to an attacker immediately after being exploited.”

Validated Remote Code Execution Vulnerability

WP Super Cache contains a variety of RCE abuse called the Authenticated Remote Code Execution.

A verified Remote Code Execution vulnerability is an assault wherein the assailant should initially be registered with the site.

What level of registration is required relies upon the specific vulnerability and can vary.

Sometimes it should be a registered user with editing advantages. In the direst scenario, all the attacker needs are the least registration level, for example, a subscriber level.

No details have been published regarding which sort of validation is required for the exploit.

This is the extra detail that was uncovered:

“Authenticated Remote Code Execution (RCE) vulnerability (settings page) discovered…”

Fix Has Been Issued Update Immediately

Automattic, the designer of WP Super Cache has updated the product. Publishers who utilize the plugin are asked to consider moving up to the most recent version, 1.7.2.

Each product publisher publishes a changelog that mentions to the clients what is in an update so they know why the product is being updated.

As per the changelog for WP Super Cache Version 1.7.2:

“Fixed authenticated RCE in the settings page.”

As per Oliver Sild, CEO and Founder of site security organization Patchstack (@patchstackapp):

“The fixed issue is of low severity… But it’s still advised to update the plugin ASAP though.”

We at CodeLedge, offer Sweden’s best WordPress development services. Our WordPress development experts are very professional to develop creative WordPress websites for every type of business. Email us at hi@codeledge.com or get a quote from here.

References

Patchstack Report: WordPress WP Super Cache Plugin <= 1.7.1 – Authenticated Remote Code Execution (RCE) Vulnerability

WP Super Cache Changelog

Leave a Reply

Your email address will not be published. Required fields are marked *

Translate »