{"uuid": "dbf6ae5a-082a-45ae-be2a-3774cd5676ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-40000", "type": "exploited", "source": "https://t.me/KomunitiSiber/1908", "content": "Hackers Exploiting LiteSpeed Cache Bug to Gain Full Control of WordPress Sites\nhttps://thehackernews.com/2024/05/hackers-exploiting-litespeed-cache-bug.html\n\nA high-severity flaw impacting\u00a0the LiteSpeed Cache plugin for WordPress\u00a0is being actively exploited by threat actors\u00a0to create rogue admin accounts on susceptible websites.\nThe\u00a0findings\u00a0come from WPScan, which said that the vulnerability (CVE-2023-40000, CVSS score: 8.3)\u00a0has\u00a0been leveraged\u00a0to set up bogus admin users with the names\u00a0wpsupp\u2011user\u00a0", "creation_timestamp": "2024-05-08T10:40:26.000000Z"}