Oasis Ticket Sales Scams: How to Stay Safe
During our weekly meetings with the banking industry and Police Scotland, we continue to see a significant increase in ticket scams over the last three…
WordPress website owners and administrators should be aware of a recent surge in attacks exploiting a security vulnerability in older versions of the popular LiteSpeed Cache plugin. This plugin is a powerful performance optimisation tool used by millions of websites to speed up page loads. However, neglecting to update it can leave your site open to attack.
The vulnerability (CVE-2023-40000) exists in LiteSpeed Cache versions older than 5.7.0.1. Attackers can exploit this flaw to inject malicious JavaScript code into a website. This code often performs the following actions:
The most effective defence against this threat is to take these immediate steps:
If you find signs of compromise, such as the “wpsupp-user” account or suspicious JavaScript code, immediately perform a complete site cleanup:
Proactive security measures help minimise the risk of your site falling victim. By updating plugins, staying vigilant, and keeping clean backups, you significantly increase your WordPress website’s security.
This vulnerability highlights the dangers of outdated software on websites. Hackers often target known vulnerabilities within popular plugins.