• PumpaXXL

    (@pumpaxxl)


    Hi, my host issued this:

    Due to an identified vulnerability in the WP Fastest Cache plugin, the wordpress_logged_in* cookie is now globally blocked by web hosts if it contains any of the following characters &+?'”

    Is it already solved?

    Thanks,
    Pavel.

Viewing 5 replies - 1 through 5 (of 5 total)
  • Plugin Author Emre Vona

    (@emrevona)

    do you have any tutorial about it?

    Thread Starter PumpaXXL

    (@pumpaxxl)

    Unfortunatelly not. Only this message. They are not that small though, 300 000+ clients, 45 datacenters.

    • This reply was modified 8 months, 4 weeks ago by PumpaXXL.
    Plugin Author Emre Vona

    (@emrevona)

    I could not understand the message.

    Hello @pumpaxxl,
    I’m also using WP Fastest Cache and today I discovered a published post by exploiting some vulnerability. It might be related to a cronjob (event wp_fastest_cache_Preload) exploiting the WordPress login.
    Can you offer more details about your situation?

    Thank you!

    Thread Starter PumpaXXL

    (@pumpaxxl)

    Hi, I don’t have anything else. Just the message in my host console.
    Sorry, P.

Viewing 5 replies - 1 through 5 (of 5 total)
  • The topic ‘Vulnerability’ is closed to new replies.