The W3SPEEDSTER plugin for WordPress is vulnerable to...
Critical severity
Unreviewed
Published
Oct 30, 2024
to the GitHub Advisory Database
•
Updated Oct 30, 2024
Description
Published by the National Vulnerability Database
Oct 30, 2024
Published to the GitHub Advisory Database
Oct 30, 2024
Last updated
Oct 30, 2024
The W3SPEEDSTER plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 7.26 via the 'script' parameter of the hookBeforeStartOptimization() function. This is due to the plugin passing user supplied input to eval(). This makes it possible for authenticated attackers, with Administrator-level access and above, to execute code on the server.
References