Input validation vulnerability in WP Fastest Cache 0.8.5.9

The WP Fastest Cache plugin for WordPress is vulnerable to a security issue that can be exploited by malicious actors. Versions up to 0.8.5.9 of the plugin are affected. Attackers with access to a WordPress account can send a special request (using the id POST parameter) that will try to include and execute any arbitrary file on the server. This can be used to bypass security controls, steal sensitive data and even execute malicious code. This security issue was not properly addressed until recently, as mentioned in the link provided (https://ti.wordfence.io/vulnerabilities/3ebe25a7-fa4d-4e3f-b969-2ff3a8388b06).

Detected in:

WP Fastest Cache fixed vulnerable versions: >= * <= 0.8.5.9

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.