WP Super Cache < 1.7.3 - Authenticated RCE due to incomplete CVE-2021-24209 fix. Exploitable parameters allow input of "$" and "\n
Reporter | Title | Published | Views | Family All 7 |
---|---|---|---|---|
wpexploit | WP Super Cache < 1.7.3 - Authenticated Remote Code Execution | 14 May 202100:00 | – | wpexploit |
OpenVAS | WordPress WP Super Cache Plugin < 1.7.3 Multiple Vulnerabilities | 22 Jun 202100:00 | – | openvas |
OSV | CVE-2021-24312 | 1 Jun 202114:15 | – | osv |
Prion | Design/Logic Flaw | 1 Jun 202114:15 | – | prion |
Cvelist | CVE-2021-24312 WP Super Cache < 1.7.3 - Authenticated Remote Code Execution | 1 Jun 202111:33 | – | cvelist |
NVD | CVE-2021-24312 | 1 Jun 202114:15 | – | nvd |
CVE | CVE-2021-24312 | 1 Jun 202114:15 | – | cve |
Source | Link |
---|---|
plugins | www.plugins.trac.wordpress.org/changeset/2522794/wp-super-cache |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo