cleantalk
Vulnerabilities and Security Researches

Vulnerabilities and security researches forsg-cachepress sg-cachepress

Direction: ascending
Jun 07, 2024

Speed Optimizer – The All-In-One WordPress Performance-Boosting Plugin # CVE-2024-32532

CVE, Research URL

CVE-2024-32532

Date
Apr 17, 2024
Research Description
Missing Authorization vulnerability in SiteGround Speed Optimizer.This issue affects Speed Optimizer: from n/a through 7.4.6.
Affected versions
Min -, max -.
Status
vulnerable

Speed Optimizer – The All-In-One WordPress Performance-Boosting Plugin # b98d1c072f7cbe2460b8f8733134447480a1bb26

Date
Mar 14, 2019
Research Description
Speed Optimizer &#8211; The All-In-One Performance-Boosting Plugin [sg-cachepress] < 5.0.13 SiteGround Optimizer <= 5.0.12 - Missing Authorization The SiteGround Optimizer plugin for WordPress is vulnerable to authorization bypass leading to Remote Code Execution and Local File Inclusion in versions up to, and including, 5.0.12 due to incorrect use of an access control attribute on the switch_php function called via the /switch-php REST API route. This allows attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
Affected versions
Min -, max -.
Status
vulnerable
Oct 18, 2024

Speed Optimizer &#8211; The All-In-One WordPress Performance-Boosting Plugin # CVE-2019-25217

CVE, Research URL

CVE-2019-25217

Date
Oct 16, 2024
Research Description
The SiteGround Optimizer plugin for WordPress is vulnerable to authorization bypass leading to Remote Code Execution and Local File Inclusion in versions up to, and including, 5.0.12 due to incorrect use of an access control attribute on the switch_php function called via the /switch-php REST API route. This allows attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
Affected versions
Min -, max -.
Status
vulnerable