Lucene search

K
WpfastestcacheWp Fastest Cache*

7 matches found

CVE
CVE
added 2023/12/04 10:15 p.m.105 views

CVE-2023-6063

The WP Fastest Cache WordPress plugin before 1.2.2 does not properly sanitise and escape a parameter before using it in a SQL statement, leading to a SQL injection exploitable by unauthenticated users.

7.5CVSS7.9AI score0.919EPSS
Web
CVE
CVE
added 2023/05/30 8:15 a.m.80 views

CVE-2023-1938

The WP Fastest Cache WordPress plugin before 1.1.5 does not have CSRF check in an AJAX action, and does not validate user input before using it in the wp_remote_get() function, leading to a Blind SSRF issue

8.8CVSS8.6AI score0.07128EPSS
Web
CVE
CVE
added 2021/04/27 6:15 a.m.59 views

CVE-2021-20714

Directory traversal vulnerability in WP Fastest Cache versions prior to 0.9.1.7 allows a remote attacker with administrator privileges to delete arbitrary files on the server via unspecified vectors.

6.5CVSS6.3AI score0.02219EPSS
CVE
CVE
added 2019/08/14 3:15 p.m.48 views

CVE-2015-9316

The wp-fastest-cache plugin before 0.8.4.9 for WordPress has SQL injection in wp-admin/admin-ajax.php?action=wpfc_wppolls_ajax_request via the poll_id parameter.

9.8CVSS9.9AI score0.01484EPSS
Web
CVE
CVE
added 2024/10/16 7:15 a.m.47 views

CVE-2020-36836

The WP Fastest Cache plugin for WordPress is vulnerable to unauthorized arbitrary file deletion in versions up to, and including, 0.9.0.2 due to a lack of capability checking and insufficient path validation. This makes it possible for authenticated users with minimal permissions to delete arbitrar...

8.8CVSS8.4AI score0.27243EPSS
CVE
CVE
added 2024/01/16 4:15 p.m.39 views

CVE-2021-24869

The WP Fastest Cache WordPress plugin before 0.9.5 does not escape user input in the set_urls_with_terms method before using it in a SQL statement, leading to an SQL injection exploitable by low privilege users such as subscriber

8.8CVSS8.9AI score0.00618EPSS
CVE
CVE
added 2024/01/16 4:15 p.m.26 views

CVE-2021-24870

The WP Fastest Cache WordPress plugin before 0.9.5 is lacking a CSRF check in its wpfc_save_cdn_integration AJAX action, and does not sanitise and escape some the options available via the action, which could allow attackers to make logged in high privilege users call it and set a Cross-Site Script...

6.1CVSS6.3AI score0.0013EPSS