<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>wordpress vulnerability Archives - Tricky Enough</title>
	<atom:link href="https://www.trickyenough.com/news-tag/wordpress-vulnerability/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.trickyenough.com/news-tag/wordpress-vulnerability/</link>
	<description>Explore and Share the Tech</description>
	<lastBuildDate>Fri, 27 Dec 2024 12:18:54 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.trickyenough.com/wp-content/uploads/2021/05/favicon-32x32-1.png</url>
	<title>wordpress vulnerability Archives - Tricky Enough</title>
	<link>https://www.trickyenough.com/news-tag/wordpress-vulnerability/</link>
	<width>32</width>
	<height>32</height>
</image> 
<site xmlns="com-wordpress:feed-additions:1">100835972</site>	<item>
		<title>LiteSpeed Cache Plugin Has A Critical Security Vulnerability</title>
		<link>https://www.trickyenough.com/news/litespeed-cache-plugin-has-a-critical-security-vulnerability/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=litespeed-cache-plugin-has-a-critical-security-vulnerability</link>
					<comments>https://www.trickyenough.com/news/litespeed-cache-plugin-has-a-critical-security-vulnerability/#respond</comments>
		
		<dc:creator><![CDATA[Robin Khokhar]]></dc:creator>
		<pubDate>Mon, 09 Sep 2024 08:32:00 +0000</pubDate>
				<guid isPermaLink="false">https://www.trickyenough.com/?post_type=news&#038;p=143992</guid>

					<description><![CDATA[<p>Critical security vulnerabilities have been found in the LiteSpeed Cache Plugin for WordPress. These vulnerabilities could affect more than 1.1 million WordPress users. LiteSpeed, also termed as LSCache is a WordPress website builder. It ensures fast and quick page load time and an overall enhanced user experience. Additionally, this plugin also makes improvements to the...</p>
<p>The post <a href="https://www.trickyenough.com/news/litespeed-cache-plugin-has-a-critical-security-vulnerability/">LiteSpeed Cache Plugin Has A Critical Security Vulnerability</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Critical security vulnerabilities have been found in the LiteSpeed Cache Plugin for WordPress. These vulnerabilities could affect more than 1.1 million WordPress users.</p>



<p><a href="https://lscache.io/plugins/lscache-for-wordpress/" target="_blank" rel="nofollow noopener">LiteSpeed, also termed as LSCache</a> is a WordPress website builder. It ensures fast and quick page load time and an overall enhanced user experience. Additionally, this plugin also makes improvements to the positions of Google Search Results. This plugin also supports bbPress, WooCommerce, and Yoast SEO among others. It is an extremely flexible and powerful cache solution benefiting both large and small websites.</p>



<p>Patchstack researchers have stated that LiteSpeedCache publically exposed the debug.log file. The bug carried a 7.5 severity score. Version 6.4.1 and the previous versions have been considered vulnerable to attacks.</p>



<h2 class="wp-block-heading" id="h-litespeed-cache-plugin-steps-to-take-against-this-vulnerability">LiteSpeed Cache Plugin: Steps to take against this vulnerability </h2>



<p>It has been reported that the critical vulnerability comes from a debug log being exposed in public. This file is called /wp-content/debug.log and the public exposure of this file could let unauthenticated attackers access important information within the file.</p>



<p>Steps should be taken to proactively purge the vulnerabilities. Users have been advised to keep their plugins updated to the newest versions to minimize the risks of attacks. Users are asked to update LiteSpeed Cache to the latest Version 6.5.0.1. Cautions have been put out as the vulnerability, CVE-2024-44000 could lead to attackers taking hold of users&#8217; accounts. The updated patch moves the log file to a different folder inside the LSCache folder. Furthermore, it also randomizes the name of the files. </p>



<p>To reduce the threat of attacks, users have also been asked to place a .htaccess rule denying direct access to log files. This method is helpful as the unauthorized actors can still access the log files by simply knowing the file name. </p>



<p><strong>Suggested:</strong></p>



<p><a href="https://www.trickyenough.com/news/wordpress-6-6-1-new-maintenance-release-for-wordpress-6-6/" target="_blank" rel="noreferrer noopener">WordPress 6.6.1: New Maintenance Release for WordPress 6.6</a>.</p>



<p><a href="https://www.trickyenough.com/news/wordpress-tracks-down-xss-vulnerability-users-to-update-to-6-5-2/" target="_blank" rel="noreferrer noopener">WordPress Tracks Down XSS Vulnerability- Users To Update To 6.5.2</a>.</p>
<p>The post <a href="https://www.trickyenough.com/news/litespeed-cache-plugin-has-a-critical-security-vulnerability/">LiteSpeed Cache Plugin Has A Critical Security Vulnerability</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.trickyenough.com/news/litespeed-cache-plugin-has-a-critical-security-vulnerability/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">143992</post-id>	</item>
		<item>
		<title>WordPress Superhero Challenge Opened by Wordfence</title>
		<link>https://www.trickyenough.com/news/wordpress-superhero-challenge-opened-by-wordfence/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=wordpress-superhero-challenge-opened-by-wordfence</link>
					<comments>https://www.trickyenough.com/news/wordpress-superhero-challenge-opened-by-wordfence/#respond</comments>
		
		<dc:creator><![CDATA[Yibeni Tungoe]]></dc:creator>
		<pubDate>Sat, 17 Aug 2024 11:55:00 +0000</pubDate>
				<guid isPermaLink="false">https://www.trickyenough.com/?post_type=news&#038;p=139125</guid>

					<description><![CDATA[<p>Wordfence has introduced the WordPress Superhero Challenge as an initiative under the Bug Bounty Program. This challenge is open until the 14th of October with cash prizes of up to $31,200. The challenge is targeted solely towards themes and plugins that have more than five million installations. Wordfence aims to secure the Web by funding...</p>
<p>The post <a href="https://www.trickyenough.com/news/wordpress-superhero-challenge-opened-by-wordfence/">WordPress Superhero Challenge Opened by Wordfence</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Wordfence has introduced the WordPress Superhero Challenge as an initiative under the Bug Bounty Program. This challenge is open until the 14th of October with cash prizes of up to $31,200. </p>



<p>The challenge is targeted solely towards themes and plugins that have more than five million installations. Wordfence aims to secure the Web by funding vulnerability research and releasing the vulnerabilities accordingly. </p>



<p>Vulnerability researchers interested in participating in the <a href="https://www.wordfence.com/threat-intel/bug-bounty-program/" target="_blank" rel="nofollow noopener">WordPress Superhero Challenge can sign up through Wordfence&#8217;s official page.</a></p>



<h2 class="wp-block-heading" id="h-wordpress-superhero-challenge-competition-details">WordPress Superhero Challenge: Competition details</h2>



<p>In addition to the cash prize, selected researchers will also be granted a WordPress Superhero badge which will indicate their spectacular efforts towards the security of WordPress. </p>



<p>The Bug Bounty Program was released by Wordfence in 2023 to remunerate researchers for their efforts in discovering and reporting vulnerabilities confidentially. Researchers are also rewarded based on the vulnerability&#8217;s criticality and prevalence, ongoing install counts and exploitation ease. Wordfence has spent more than $300,000 in &#8216;bounties&#8217; ever since its first launch in 2023. </p>



<p>This program does not include companies like Automattic, Google, Siteground and Brainstorm. This exclusion is because these companies have their separate reward programs. </p>



<p>Threat Intelligence Lead at Wordfence, Chloe Chamberland has stated in an official blog that Wordfence plans to supercharge the amount of research needed for trending products. This would consequently improve the security of millions of site visitors who have the products already installed. </p>



<p><strong>Suggested:</strong></p>



<p><a href="https://www.trickyenough.com/news/wordpress-6-6-1-new-maintenance-release-for-wordpress-6-6/" target="_blank" rel="noreferrer noopener">WordPress 6.6.1: New Maintenance Release for WordPress 6.6</a>.</p>



<p><a href="https://www.trickyenough.com/news/vulnerability-in-the-wordpress-plugin-for-the-metform-elementor-contact-form-builder/" target="_blank" rel="noreferrer noopener">Vulnerability in the WordPress plugin for the Metform Elementor Contact Form Builder.<br></a></p>
<p>The post <a href="https://www.trickyenough.com/news/wordpress-superhero-challenge-opened-by-wordfence/">WordPress Superhero Challenge Opened by Wordfence</a> appeared first on <a href="https://www.trickyenough.com">Tricky Enough</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.trickyenough.com/news/wordpress-superhero-challenge-opened-by-wordfence/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
		<post-id xmlns="com-wordpress:feed-additions:1">139125</post-id>	</item>
	</channel>
</rss>
