Skip to content
  • Home
  • Services
    • Combo Plans
      • Shared Support
      • Semi Dedicated Support
      • Dedicated Support
    • Control Panel Support
      • DirectAdmin Support
      • cPanel Support
      • Plesk Support
    • Server Setup & Support
  • Products
    • Managed Migration
    • Nginx Support
    • Varnish Support
    • Shield
  • Careers
    • Internship Programme
  • KnowledgeBase
  • Contact Us
  • Blog
  • About Us

WHM-cPanel Control Panel

4
  • How to log in to cPanel?
  • How to find outdated services in cPanel
  • Exclude services from the outdated services script’s check in cPanel
  • catch-all accounts, and how to add that in cPanel

Email

3
  • How to install mail function on a Centos server.
  • SPF, DKIM, and DMARC records explained
  • How to configure an Email account manually on the Thunderbird client

SSL certificates

3
  • How to install SSL on nginx with Let’s Encrypt
  • SSL installation and renewal on an Nginx server
  • Installation of SSL in Haproxy and HTTP to HTTPS Redirection

Webservers

1
  • Enable GZIP compression in Nginx

Security

1
  • Disabling mail alerts from LFD

News

46
  • White House report on Open-source AI models
  • Linux Kernel 6.9 – End of Life
  • Verify if SystemD or not on Linux
  • SLUBStick: A Groundbreaking Kernel Exploitation Technique
  • Top 5 Linux Distros for Every User Level
  • Alpaca: The Open-Source AI Model for Linux Enthusiasts
  • Zero-Day Threat: The Risks of the IP Address Exploit
  • Intel Engineer Boosts Linux Kernel Boot Time by 0.035 Seconds
  • Canonical’s New Aggressive Kernel Policy: Ubuntu Releases
  • KDE Frameworks 6.5 Released: What’s New?
  • Ubuntu 24.10 to Feature the Latest Linux Kernel
  • Linux 6.11-rc3 Released: Performance Boosts and Key Fixes
  • The Open Model Initiative Joins the Linux Foundation
  • New Study Debunks Fears of AI Threats
  • AI-Powered Screenshot Search for Pixel 9 Devices
  • Fastfetch: A High-Performance Alternative to Neofetch
  • Containers: Efficient OS-Level Virtualization & Top Tools
  • Tails 6.6-Enhanced Security, Anonymity,Decentralized Features
  • Kubernetes 1.31 “Elli” Release: New Features and Updates
  • Unleashing the Power of Arch Linux with Archinstall 2.8.2
  • Deepin 23 Released with Atomic Updates and Broad CPU Support
  • Secure Your Linux Systems with Expert Cybersecurity
  • NGINX Fixes Buffer Overread Vulnerability (CVE-2024-7347)
  • Linux Kernel Flaw Lets Attackers Bypass CPU and Write to Memory
  • 0.0.0.0 Day Vulnerability:18-Year-Old Browser Flaw
  • CachyOS August 2024: Open NVIDIA Modules & COSMIC Desktop
  • Windows Update Breaks Linux Boot on Dual-Boot Systems
  • EasyOS 6.2 Released: Lightweight Linux Distro-New Features
  • Upstreaming Linux Kernel Support for Raspberry Pi 5
  • Canonical Pauses Ubuntu Kernel Updates Until October 2024
  • 9 Years of LVFS: Transforming Linux Firmware Updates
  • Record Bounty Awarded for LiteSpeed Cache Vulnerability
  • Red Hat OpenShift Lightspeed: AI Assistant for OpenShift
  • Linux 6.12 Introduces QR Code in DRM Panic Handler
  • Rust for Linux Maintainer Resigns Amid ‘Nontechnical Nonsense’
  • Ubuntu 24.10 to Feature Latest Linux 6.11 Kernel
  • LinkedIn Migrates from CentOS to Azure Linux
  • Linux 6.11-rc5 Released with Streamlined Bcachefs Fixes
  • AMD Preferred Core Fix Arrives Before Linux 6.11-rc6
  • Debian 12.7 Released: 55 Security Updates, 51 Bug Fixes
  • 4MLinux 46 Released: New Apps, LAMP Server Included
  • Cicada3301 Ransomware Targets VMware ESXi Systems
  • Advanced Linux Persistence Techniques: Elastic Security’s Insights
  • Sedexp Malware Evades Detection for Two Years on Linux
  • Minimal Linux Runs on Raspberry Pi’s RP2350 Microcontroller
  • Manage Linux User Activity with Acct/Psacct

Operating System

1
  • CentOS 7 End-of-Life: What You Need to Know and How to Migrate
  • Home
  • KnowledgeBase
  • News
  • Record Bounty Awarded for LiteSpeed Cache Vulnerability
View Categories

Record Bounty Awarded for LiteSpeed Cache Vulnerability

1 min read

A critical security vulnerability has been uncovered in the LiteSpeed Cache plugin for WordPress, impacting over five million websites. Discovered by security researcher John Blackbourn, this flaw poses a severe risk, allowing unauthorized users to gain administrator-level access to websites.

bounty

Patchstack, a leading security platform, awarded Blackbourn a record-breaking $14,400 bounty for his discovery—the highest ever in WordPress bug bounty history.

Understanding the Vulnerability #

The vulnerability, identified as CVE-2024-28000, is classified as an unauthenticated privilege escalation. It exploits a weak security hash within the plugin’s user simulation feature. This feature, designed for the plugin’s crawler function, used a predictable hash based on known values. As a result, attackers could brute-force their way to gain unauthorized access, compromising entire websites.

Key Factors Behind the Vulnerability #

Several factors contributed to this critical flaw:

  • The random number generator used to create the security hash relied on a limited set of values, making it predictable.
  • The generator lacked cryptographic security, further weakening the hash.
  • The hash was stored without salting or connection to specific users, making it universally applicable.

Even websites with the crawler feature disabled were at risk due to an unprotected Ajax handler that allowed hash generation. Patchstack researchers confirmed that a brute-force attack could grant unauthorized access in as little as a few hours.

Record-Breaking Bounty for LiteSpeed Cache Vulnerability #

In recognition of this significant discovery, Patchstack awarded John Blackbourn a $14,400 bounty, the highest ever in the history of WordPress bug bounty hunting. This record-breaking reward underscores the critical nature of the vulnerability and the importance of proactive security measures in the WordPress ecosystem.

Immediate Actions Required

If your website uses the LiteSpeed Cache plugin, immediate action is necessary:

  1. Update the Plugin: Upgrade to version 6.4 or higher of the LiteSpeed Cache plugin.
  2. Review User Accounts: Audit your site’s user list and remove any suspicious administrator accounts.
  3. Implement Temporary Mitigations: If an immediate update isn’t possible, consider temporary measures like modifying the router.cls.php file or applying mod_sec rules as detailed in LiteSpeed’s official blog.

Conclusion

The discovery of this vulnerability highlights the importance of maintaining up-to-date software. The LiteSpeed team responded quickly, but website owners must act immediately to protect their sites. By updating to the latest version of the LiteSpeed Cache plugin and following additional security recommendations, you can safeguard your website from potential attacks.

Don’t delay—secure your website now by updating the LiteSpeed Cache plugin to the latest version.

Share This Article :

  • Facebook
  • X
  • LinkedIn
  • Pinterest
Still stuck? How can we help?

How can we help?

Updated on August 23, 2024
9 Years of LVFS: Transforming Linux Firmware UpdatesRed Hat OpenShift Lightspeed: AI Assistant for OpenShift

Powered by BetterDocs

Table of Contents
  • Understanding the Vulnerability
  • Key Factors Behind the Vulnerability
  • Record-Breaking Bounty for LiteSpeed Cache Vulnerability

The last technical support you will ever need!

select one of our plans and start building the most wanted app/website available today. We make sure every aspect of the server maintenance are handled with  a level of expertise needed for growing your business!

Copyright 2025 techprovidence