{"containers":{"cna":{"affected":[{"product":"Speed Booster Pack ⚡ PageSpeed Optimization Suite","vendor":"Unknown","versions":[{"lessThan":"4.2.0-beta*","status":"affected","version":"4.2.0-beta","versionType":"custom"},{"lessThan":"4.2.0","status":"affected","version":"4.2.0","versionType":"custom"}]}],"credits":[{"lang":"en","value":"m0ze"}],"descriptions":[{"lang":"en","value":"The Speed Booster Pack ⚡ PageSpeed Optimization Suite WordPress plugin before 4.2.0 did not validate its caching_exclude_urls and caching_include_query_strings settings before outputting them in a PHP file, which could lead to RCE"}],"problemTypes":[{"descriptions":[{"cweId":"CWE-94","description":"CWE-94 Improper Control of Generation of Code ('Code Injection')","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2021-08-02T10:31:56.000Z","orgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","shortName":"WPScan"},"references":[{"tags":["x_refsource_MISC"],"url":"https://wpscan.com/vulnerability/945d6d2e-fa25-42c0-a7b4-b1794732a0df"},{"tags":["x_refsource_MISC"],"url":"https://m0ze.ru/vulnerability/%5B2021-05-10%5D-%5BWordPress%5D-%5BCWE-94%5D-Speed-Booster-Pack-WordPress-Plugin-v4.2.0-beta.txt"}],"source":{"discovery":"UNKNOWN"},"title":"Speed Booster Pack 4.2.0-beta - Authenticated (admin+) RCE","x_generator":"WPScan CVE Generator","x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"contact@wpscan.com","ID":"CVE-2021-24430","STATE":"PUBLIC","TITLE":"Speed Booster Pack 4.2.0-beta - Authenticated (admin+) RCE"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Speed Booster Pack ⚡ PageSpeed Optimization Suite","version":{"version_data":[{"version_affected":">=","version_name":"4.2.0-beta","version_value":"4.2.0-beta"},{"version_affected":"<","version_name":"4.2.0","version_value":"4.2.0"}]}}]},"vendor_name":"Unknown"}]}},"credit":[{"lang":"eng","value":"m0ze"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The Speed Booster Pack ⚡ PageSpeed Optimization Suite WordPress plugin before 4.2.0 did not validate its caching_exclude_urls and caching_include_query_strings settings before outputting them in a PHP file, which could lead to RCE"}]},"generator":"WPScan CVE Generator","problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-94 Improper Control of Generation of Code ('Code Injection')"}]}]},"references":{"reference_data":[{"name":"https://wpscan.com/vulnerability/945d6d2e-fa25-42c0-a7b4-b1794732a0df","refsource":"MISC","url":"https://wpscan.com/vulnerability/945d6d2e-fa25-42c0-a7b4-b1794732a0df"},{"name":"https://m0ze.ru/vulnerability/[2021-05-10]-[WordPress]-[CWE-94]-Speed-Booster-Pack-WordPress-Plugin-v4.2.0-beta.txt","refsource":"MISC","url":"https://m0ze.ru/vulnerability/[2021-05-10]-[WordPress]-[CWE-94]-Speed-Booster-Pack-WordPress-Plugin-v4.2.0-beta.txt"}]},"source":{"discovery":"UNKNOWN"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-03T19:28:23.974Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"https://wpscan.com/vulnerability/945d6d2e-fa25-42c0-a7b4-b1794732a0df"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://m0ze.ru/vulnerability/%5B2021-05-10%5D-%5BWordPress%5D-%5BCWE-94%5D-Speed-Booster-Pack-WordPress-Plugin-v4.2.0-beta.txt"}]}]},"cveMetadata":{"assignerOrgId":"1bfdd5d7-9bf6-4a53-96ea-42e2716d7a81","assignerShortName":"WPScan","cveId":"CVE-2021-24430","datePublished":"2021-08-02T10:31:56.000Z","dateReserved":"2021-01-14T00:00:00.000Z","dateUpdated":"2024-08-03T19:28:23.974Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}