The WP Super Cache WordPress plugin before 1.7.2 was affected by an authenticated (admin+) RCE in the settings page due to input validation failure and weak $cache_path check in the WP Super Cache Settings -> Cache Location option. Direct access to the wp-cache-config.php file is not prohibited, so this vulnerability can be exploited for a web shell injection.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://wpscan.com/vulnerability/733d8a02-0d44-4b78-bbb2-37e447acd2f3 | third party advisory vdb entry exploit technical description |
https://plugins.trac.wordpress.org/changeset/2496238/wp-super-cache | third party advisory patch |