WP Super Cache

The WordPress plugin generates static HTML files from dynamic WordPress blogs, which are served to users who are not logged in, have not left a comment, or viewed a password-protected post. The plugin serves cached files in three ways, with the fastest method using Apache mod_rewrite to serve "supercached" static HTML files. The recommended method is to serve "supercached" files through PHP, and the WP-Cache caching method is used to cache pages for known users, URLs with parameters, and feeds.

This information is sourced from wpvulnerabilities.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Vulnerabilities

  • Input validation vulnerability in WP Super Cache 1.3.2

    Fixed

    The WordPress W3 Super Cache Plugin

    Read More
  • Input validation vulnerability in WP Super Cache 1.2

    Fixed

    The WP Super Cache plugin

    Read More
  • Output validation vulnerability in WP Super Cache 1.4.5

    Fixed

    The WP Super Cache plugin for WordPress is vulnerable to a security flaw that can be exploited by attackers. If someone with malicious intent is able to gain access to the plugin, they can use it to ...

    Read More
  • Input validation vulnerability in WP Super Cache 1.7.3

    Fixed

    The WP Super Cache WordPress plugin before version 1.7.3 had some settings that could let hackers take control of the website. This was caused by an incomplete fix of a security issue (CVE-2021-24209)...

    Read More
  • Input validation vulnerability in WP Super Cache 1.4.5

    Fixed

    The WP Super Cache plugin for WordPress was found to have a vulnerability in versions up to, and including, 1.4.4. An attacker with access to the website could delete some index files, which could ca...

    Read More
  • Input validation vulnerability in WP Super Cache 1.4.8

    Fixed

    The WP Super Cache plugin for WordPress has a security vulnerability that could allow attackers to execute web scripts on a victim's browser. This vulnerability exists in versions up to, and includin...

    Read More
  • Input validation vulnerability in WP Super Cache 1.4.3

    Fixed

    The WP Super Cache plugin for WordPress is vulnerable to a security issue called Stored Cross-Site Scripting. This issue affects versions of the plugin up to and including 1.4.3. It allows attackers ...

    Read More
  • Input validation vulnerability in WP Super Cache 1.8

    Fixed

    The WP Super Cache plugin for WordPress has a vulnerability in versions up to 1.8 that could cause a website to serve harmful content to visitors. This vulnerability, called Unauthenticated Cache Poi...

    Read More
  • Input validation vulnerability in WP Super Cache 1.7.3

    Fixed

    The Twitter Bootstrap Slider plugin for WordPress has a security vulnerability in versions up to and including 1.7.2. It allows attackers with administrative permissions to insert malicious web script...

    Read More
  • Input validation vulnerability in WP Super Cache 1.3

    Fixed

    The WordPress Super Cache Plugin 1.3 has a security vulnerability which allows attackers to inject malicious code into certain parts of the plugin. This could allow them to access your website and do ...

    Read More
  • Input validation vulnerability in WP Super Cache 1.7.2

    Fixed

    Read More
  • Access violation vulnerability in WP Super Cache 1.4.5

    Fixed

    The WP Super Cache plugin for WordPress is not secure in versions up to 1.4.4. This means that someone who is not authorized to do so can access and see the content of any folder on the server, which...

    Read More