Home

Description

The W3 Total Cache plugin for WordPress is vulnerable to Sensitive Information Exposure in versions up to, and including, 2.7.5 via Google OAuth API secrets stored in plaintext in the publicly visible plugin source. This can allow unauthenticated attackers to impersonate W3 Total Cache and gain access to user account information in successful conditions. This would not impact the WordPress users site in any way.

PUBLISHED Reserved 2023-10-03 | Published 2024-09-24 | Updated 2024-09-24 | Assigner Wordfence




LOW: 3.7CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

Product status

Default status
unaffected

* (semver)
affected

Timeline

2024-09-23:Disclosed

Credits

Ivan Kuzymchak finder

References

www.wordfence.com/...-978e-4fd8-be3a-5137bdc22dc9?source=cve

plugins.trac.wordpress.org/...-cache/trunk/PageSpeed_Api.php

plugins.trac.wordpress.org/...e/tags/2.7.6/PageSpeed_Api.php

cve.org (CVE-2023-5359)

nvd.nist.gov (CVE-2023-5359)