CVE-2023-40000
📋 TL;DR
This vulnerability allows unauthenticated attackers to inject malicious scripts into web pages generated by LiteSpeed Cache, leading to stored cross-site scripting (XSS). It affects WordPress sites using LiteSpeed Cache plugin versions up to 5.7, potentially compromising site visitors and administrators.
💻 Affected Systems
- LiteSpeed Cache WordPress Plugin
📦 What is this software?
Litespeed Cache by Litespeedtech
⚠️ Risk & Real-World Impact
Worst Case
Attackers can steal session cookies, redirect users to malicious sites, or deface the website, leading to full site compromise and data theft.
Likely Case
Unauthenticated attackers inject scripts to hijack user sessions or perform actions on behalf of users, causing reputational damage and potential data breaches.
If Mitigated
With proper input validation and output encoding, the risk is reduced to minimal, but patching is essential to prevent exploitation.
🎯 Exploit Status
Exploit code is publicly available, making it easy for attackers to leverage this vulnerability without authentication.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.7.1 or later
Vendor Advisory: https://patchstack.com/database/vulnerability/litespeed-cache/wordpress-litespeed-cache-plugin-5-7-unauthenticated-site-wide-stored-xss-vulnerability
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find LiteSpeed Cache and update to version 5.7.1 or higher. 4. Verify the update is successful.
🔧 Temporary Workarounds
Disable LiteSpeed Cache Plugin
allTemporarily deactivate the plugin to mitigate risk until patching is possible.
wp plugin deactivate litespeed-cache
🧯 If You Can't Patch
- Implement web application firewall (WAF) rules to block XSS payloads targeting LiteSpeed Cache endpoints.
- Restrict access to the WordPress admin panel and monitor for suspicious activity in logs.
🔍 How to Verify
Check if Vulnerable:
Check the plugin version in WordPress admin under Plugins > Installed Plugins; if LiteSpeed Cache is version 5.7 or lower, it is vulnerable.
Check Version:
wp plugin get litespeed-cache --field=version
Verify Fix Applied:
After updating, confirm the plugin version is 5.7.1 or higher in the same location.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to LiteSpeed Cache endpoints with script tags or JavaScript payloads in logs.
Network Indicators:
- HTTP requests containing malicious scripts targeting /wp-admin/admin-ajax.php or similar paths.
SIEM Query:
source="web_logs" AND (url="*litespeed-cache*" AND (payload="*<script>*" OR payload="*javascript:*"))
🔗 References
- https://patchstack.com/database/vulnerability/litespeed-cache/wordpress-litespeed-cache-plugin-5-7-unauthenticated-site-wide-stored-xss-vulnerability?_s_id=cve
- https://patchstack.com/database/vulnerability/litespeed-cache/wordpress-litespeed-cache-plugin-5-7-unauthenticated-site-wide-stored-xss-vulnerability?_s_id=cve
- https://github.com/rxerium/CVE-2023-40000