CVE-2024-44000

CRITICAL EXPLOITED NUCLEI

Litespeedtech Litespeed Cache - Insufficiently Protected Credentials

Title source: rule

Description

Insufficiently Protected Credentials vulnerability in LiteSpeed Technologies LiteSpeed Cache allows Authentication Bypass.This issue affects LiteSpeed Cache: from n/a before 6.5.0.1.

Exploits (6)

nomisec WORKING POC 15 stars
by absholi7ly · remote
https://github.com/absholi7ly/CVE-2024-44000-LiteSpeed-Cache
nomisec WORKING POC 4 stars
by geniuszly · remote
https://github.com/geniuszly/CVE-2024-44000
nomisec WORKING POC 3 stars
by ifqygazhar · remote
https://github.com/ifqygazhar/CVE-2024-44000-LiteSpeed-Cache
nomisec WORKING POC
by gbrsh · remote
https://github.com/gbrsh/CVE-2024-44000
exploitdb WORKING POC
by Caner Tercan · pythonwebappsphp
https://www.exploit-db.com/exploits/52099
metasploit WORKING POC EXCELLENT
by Rafie Muhammad, jheysel-r7 · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/wp_litespeed_cookie_theft.rb

Nuclei Templates (1)

LiteSpeed Cache <= 6.4.1 - Sensitive Information Exposure
HIGHVERIFIEDby s4e-io

Scores

CVSS v3 9.8
EPSS 0.9313
EPSS Percentile 99.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation Intel

VulnCheck KEV 2025-02-27

Classification

CWE
CWE-522
Status published

Affected Products (1)

litespeedtech/litespeed_cache < 6.5.0.1

Timeline

Published Oct 20, 2024
Tracked Since Feb 18, 2026