{"uuid": "b250d796-69c2-471e-9195-db1d29c4f9f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-40000", "type": "exploited", "source": "https://t.me/tengkorakcybercrewz/7144", "content": "The Hacker News\nHackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites\n\nA high-severity flaw impacting&nbsp;the LiteSpeed Cache plugin for WordPress&nbsp;is being actively exploited by threat actors&nbsp;to create rogue admin accounts on susceptible websites.\nThe&nbsp;findings&nbsp;come from WPScan, which said that the vulnerability (CVE-2023-40000, CVSS score: 8.3)&nbsp;has&nbsp;been leveraged&nbsp;to set up bogus admin users with the names&nbsp;wpsupp\u2011user&nbsp;", "creation_timestamp": "2024-05-08T11:50:28.000000Z"}