WordPress.Fastest.Cache.Plugin.is_user_admin.SQL.Injection

description-logoDescription

This indicates an attack attempt to exploit an SQL Injection Vulnerability in WordPress Project Fastest Cache Plugin.
The vulnerability is due to insufficient user input validation in the is_user_admin function. A remote, unauthenticated attacker can exploit this vulnerability by sending a specially crafted request to the target server. Successful exploitation could result in arbitrary SQL command execution against the target server's database.

affected-products-logoAffected Products

WordPress Project Fastest Cache Plugin prior to 1.2.2

Impact logoImpact

System Compromise: Remote attackers can add, view, delete or modify data in the database of the affected application

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://en-ca.wordpress.org/plugins/wp-fastest-cache/#developers

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2024-04-03 27.760 Sig Added
2024-03-25 27.754