CVE-2023-4372
WordPress vulnerability analysis and mitigation

Overview

The LiteSpeed Cache plugin for WordPress, with over 4 million active installations, was found to contain a stored Cross-Site Scripting (XSS) vulnerability, identified as CVE-2023-4372. The vulnerability was discovered on August 14, 2023, by the Wordfence Threat Intelligence team and affects versions up to and including 5.6. The issue stems from insufficient security measures in the plugin's 'esi' shortcode implementation, which is used for Edge Side Includes (ESI) technology (SecurityOnline, Wordfence Blog).

Technical details

The vulnerability is classified with a CVSS score of 6.4 (Medium) and involves the plugin's failure to properly escape the cache attribute of its 'esi' shortcode before outputting it back in a page or post. The issue specifically centers on the lack of sufficient security measures around the user-supplied 'cache' input in the ESI class. This oversight in sanitizing and escaping output enables the injection of malicious web scripts through the shortcode (WPScan, Wordfence Blog).

Impact

The vulnerability allows users with contributor-level permissions or higher to inject malicious web scripts into WordPress pages. When exploited, attackers could potentially steal sensitive information such as cookies and session tokens, alter site content, add malicious administrative users, modify crucial files, or redirect users to harmful websites (SecurityOnline).

Mitigation and workarounds

The vulnerability was patched in version 5.7 of the LiteSpeed Cache plugin, released on October 10, 2023. Site administrators are strongly advised to update to this version or higher. Additional security measures recommended include implementing a web application firewall (WAF), using content security policy (CSP) to restrict script execution, and regularly scanning the website for vulnerabilities (SecurityOnline).

Community reactions

Following the discovery, the LiteSpeed Cache developer team responded promptly to the Wordfence Threat Intelligence team's disclosure. A patch was developed by August 16, 2023, demonstrating the developer's commitment to security. The vulnerability received significant attention due to the plugin's large user base of over 4 million active installations (SecurityOnline).

Additional resources


SourceThis report was generated using AI

Related WordPress vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-23550CRITICAL10
  • modular-connector
NoYesJan 14, 2026
CVE-2025-12166HIGH7.5
  • simply-schedule-appointments
NoYesJan 14, 2026
CVE-2026-0813MEDIUM4.4
  • short-link
NoNoJan 14, 2026
CVE-2026-0812MEDIUM4.4
  • linkedin-sc
NoNoJan 14, 2026
CVE-2026-0741MEDIUM4.4
  • electric-studio-download-counter
NoNoJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management