It features an exclusive server-level cache and a collection of optimization features.

It is triggered by a weak security hash mechanism in LiteSpeed Cache versions up to and including 6.3.0.1.

This requires no user interaction and can be exploited over the web connection without requiring any privileges.

wordpress litespeed cache vulnerability

The only prerequisite is knowing the ID of an Administrator-level user and passing it in the litespeed_role cookie.

Even the Wordfence Threat Intelligence team has warned about the potential threat.

spot_img

source: www.techworm.net