CVE-2023-6598

The SpeedyCache plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the speedycache_save_varniship, speedycache_img_update_settings, speedycache_preloading_add_settings, and speedycache_preloading_delete_resource functions in all versions up to, and including, 1.1.3. This makes it possible for authenticated attackers, with subscriber-level access and above, to update plugin options.
Configurations

Configuration 1 (hide)

cpe:2.3:a:softaculous:speedycache:*:*:*:*:*:wordpress:*:*

History

17 Jan 2024, 21:24

Type Values Removed Values Added
CPE cpe:2.3:a:softaculous:speedycache:*:*:*:*:*:wordpress:*:*
CWE CWE-862
First Time Softaculous speedycache
Softaculous
References () https://plugins.trac.wordpress.org/changeset/3010577/speedycache - () https://plugins.trac.wordpress.org/changeset/3010577/speedycache - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/db8cfdba-f3b2-45dc-9be7-6f6374fd5f39?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/db8cfdba-f3b2-45dc-9be7-6f6374fd5f39?source=cve - Third Party Advisory

11 Jan 2024, 13:57

Type Values Removed Values Added
Summary
  • (es) El complemento SpeedyCache para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificación de capacidad en las funciones speedycache_save_varniship, speedycache_img_update_settings, speedycache_preloading_add_settings y speedycache_preloading_delete_resource en todas las versiones hasta la 1.1.3 incluida. Esto hace posible que los atacantes autenticados, con acceso a nivel de suscriptor y superior, actualicen las opciones del complemento.

11 Jan 2024, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-01-11 09:15

Updated : 2024-01-17 21:24


NVD link : CVE-2023-6598

Mitre link : CVE-2023-6598

CVE.ORG link : CVE-2023-6598


JSON object : View

Products Affected

softaculous

  • speedycache
CWE
CWE-862

Missing Authorization