The W3SPEEDSTER plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 7.26 via the 'script' parameter of the hookBeforeStartOptimization() function. This is due to the plugin passing user supplied input to eval(). This makes it possible for authenticated attackers, with Administrator-level access and above, to execute code on the server.
Metrics
Affected Vendors & Products
References
History
Wed, 30 Oct 2024 14:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 30 Oct 2024 11:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The W3SPEEDSTER plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 7.26 via the 'script' parameter of the hookBeforeStartOptimization() function. This is due to the plugin passing user supplied input to eval(). This makes it possible for authenticated attackers, with Administrator-level access and above, to execute code on the server. | |
Title | W3SPEEDSTER <= 7.26 - Authenticated (Administrator+) Remote Code Execution | |
Weaknesses | CWE-95 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-10-30T14:04:13.997Z
Reserved: 2024-09-06T13:43:10.915Z
Link: CVE-2024-8512

Updated: 2024-10-30T13:54:28.030Z

Status : Awaiting Analysis
Published: 2024-10-30T11:15:15.963
Modified: 2024-11-01T12:57:03.417
Link: CVE-2024-8512

No data.