CVE-2024-44000

CRITICAL EXPLOITED NUCLEI

Litespeedtech Litespeed Cache - Insufficiently Protected Credentials

Title source: rule

Description

Insufficiently Protected Credentials vulnerability in LiteSpeed Technologies LiteSpeed Cache litespeed-cache allows Authentication Bypass.This issue affects LiteSpeed Cache: from n/a through < 6.5.0.1.

Exploits (6)

exploitdb WORKING POC
by Caner Tercan · pythonwebappsphp
https://www.exploit-db.com/exploits/52099
nomisec WORKING POC 15 stars
by absholi7ly · remote
https://github.com/absholi7ly/CVE-2024-44000-LiteSpeed-Cache
nomisec WORKING POC 4 stars
by geniuszly · remote
https://github.com/geniuszly/CVE-2024-44000
nomisec WORKING POC 3 stars
by ifqygazhar · remote
https://github.com/ifqygazhar/CVE-2024-44000-LiteSpeed-Cache
nomisec WORKING POC
by gbrsh · remote
https://github.com/gbrsh/CVE-2024-44000
metasploit WORKING POC EXCELLENT
by Rafie Muhammad, jheysel-r7 · rubypocphp
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/http/wp_litespeed_cookie_theft.rb

Nuclei Templates (1)

LiteSpeed Cache <= 6.4.1 - Sensitive Information Exposure
HIGHVERIFIEDby s4e-io

Scores

CVSS v3 9.8
EPSS 0.9289
EPSS Percentile 99.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable yes
Technical Impact total

Details

VulnCheck KEV 2025-02-27
CWE
CWE-522
Status published
Products (2)
litespeedtech/litespeed_cache < 6.5.0.1
LiteSpeed Technologies/LiteSpeed Cache < 6.5.0.1
Published Oct 20, 2024
Tracked Since Feb 18, 2026