litespeedtech CVE Vulnerabilities & Metrics

Focus on litespeedtech vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About litespeedtech Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with litespeedtech. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total litespeedtech CVEs: 18
Earliest CVE date: 23 Nov 2004, 05:00 UTC
Latest CVE date: 20 Oct 2024, 12:15 UTC

Latest CVE reference: CVE-2024-44000

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 2

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -50.0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -50.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical litespeedtech CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 2.97

Max CVSS: 9.0

Critical CVEs (≥9): 1

CVSS Range vs. Count

Range Count
0.0-3.9 11
4.0-6.9 7
7.0-8.9 2
9.0-10.0 1

CVSS Distribution Chart

Top 5 Highest CVSS litespeedtech CVEs

These are the five CVEs with the highest CVSS scores for litespeedtech, sorted by severity first and recency.

All CVEs for litespeedtech

CVE-2024-44000 litespeedtech vulnerability CVSS: 0 20 Oct 2024, 12:15 UTC

Insufficiently Protected Credentials vulnerability in LiteSpeed Technologies LiteSpeed Cache allows Authentication Bypass.This issue affects LiteSpeed Cache: from n/a before 6.5.0.1.

CVE-2024-3246 litespeedtech vulnerability CVSS: 0 24 Jul 2024, 04:15 UTC

The LiteSpeed Cache plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 6.2.0.1. This is due to missing or incorrect nonce validation. This makes it possible for unauthenticated attackers to update the token setting and inject malicious JavaScript via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

CVE-2024-25678 litespeedtech vulnerability CVSS: 0 09 Feb 2024, 10:15 UTC

In LiteSpeed QUIC (LSQUIC) Library before 4.0.4, DCID validation is mishandled.

CVE-2023-4372 litespeedtech vulnerability CVSS: 0 11 Jan 2024, 09:15 UTC

The LiteSpeed Cache plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'esi' shortcode in versions up to, and including, 5.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.

CVE-2023-40518 litespeedtech vulnerability CVSS: 0 14 Aug 2023, 22:15 UTC

LiteSpeed OpenLiteSpeed before 1.7.18 does not strictly validate HTTP request headers.

CVE-2022-46800 litespeedtech vulnerability CVSS: 0 25 May 2023, 09:15 UTC

Cross-Site Request Forgery (CSRF) vulnerability in LiteSpeed Technologies LiteSpeed Cache plugin <= 5.3 versions.

CVE-2022-0074 litespeedtech vulnerability CVSS: 0 27 Oct 2022, 20:15 UTC

Untrusted Search Path vulnerability in LiteSpeed Technologies OpenLiteSpeed Web Server and LiteSpeed Web Server Container allows Privilege Escalation. This affects versions from 1.6.15 before 1.7.16.1.

CVE-2022-0073 litespeedtech vulnerability CVSS: 0 27 Oct 2022, 20:15 UTC

Improper Input Validation vulnerability in LiteSpeed Technologies OpenLiteSpeed Web Server and LiteSpeed Web Server dashboards allows Command Injection. This affects 1.7.0 versions before 1.7.16.1.

CVE-2022-0072 litespeedtech vulnerability CVSS: 0 27 Oct 2022, 20:15 UTC

Directory Traversal vulnerability in LiteSpeed Technologies OpenLiteSpeed Web Server and LiteSpeed Web Server dashboards allows Path Traversal. This affects versions from 1.5.11 through 1.5.12, from 1.6.5 through 1.6.20.1, from 1.7.0 before 1.7.16.1

CVE-2022-30592 litespeedtech vulnerability CVSS: 7.5 11 May 2022, 23:15 UTC

liblsquic/lsquic_qenc_hdl.c in LiteSpeed QUIC (aka LSQUIC) before 3.1.0 mishandles MAX_TABLE_CAPACITY.

CVE-2021-24964 litespeedtech vulnerability CVSS: 2.6 03 Jan 2022, 13:15 UTC

The LiteSpeed Cache WordPress plugin before 4.4.4 does not properly verify that requests are coming from QUIC.cloud servers, allowing attackers to make requests to certain endpoints by using a specific X-Forwarded-For header value. In addition, one of the endpoint could be used to set CSS code if a setting is enabled, which will then be output in some pages without being sanitised and escaped. Combining those two issues, an unauthenticated attacker could put Cross-Site Scripting payloads in pages visited by users.

CVE-2021-24963 litespeedtech vulnerability CVSS: 3.5 03 Jan 2022, 13:15 UTC

The LiteSpeed Cache WordPress plugin before 4.4.4 does not escape the qc_res parameter before outputting it back in the JS code of an admin page, leading to a Reflected Cross-Site Scripting

CVE-2021-26758 litespeedtech vulnerability CVSS: 9.0 07 Apr 2021, 21:15 UTC

Privilege Escalation in LiteSpeed Technologies OpenLiteSpeed web server version 1.7.8 allows attackers to gain root terminal access and execute commands on the host system.

CVE-2020-29172 litespeedtech vulnerability CVSS: 4.3 26 Dec 2020, 02:15 UTC

A cross-site scripting (XSS) vulnerability in the LiteSpeed Cache plugin before 3.6.1 for WordPress can be exploited via the Server IP setting.

CVE-2020-5519 litespeedtech vulnerability CVSS: 7.5 06 Jan 2020, 13:15 UTC

The WebAdmin Console in OpenLiteSpeed before v1.6.5 does not strictly check request URLs, as demonstrated by the "Server Configuration > External App" screen.

CVE-2018-19792 litespeedtech vulnerability CVSS: 4.6 03 Dec 2018, 06:29 UTC

The server in LiteSpeed OpenLiteSpeed before 1.5.0 RC6 allows local users to cause a denial of service (buffer overflow) or possibly have unspecified other impact by creating a symlink through which the openlitespeed program can be invoked with a long command name (involving ../ characters), which is mishandled in the LshttpdMain::getServerRootFromExecutablePath function.

CVE-2018-19791 litespeedtech vulnerability CVSS: 4.0 03 Dec 2018, 06:29 UTC

The server in LiteSpeed OpenLiteSpeed before 1.5.0 RC6 does not correctly handle requests for byte sequences, allowing an attacker to amplify the response size by requesting the entire response body repeatedly, as demonstrated by an HTTP Range header value beginning with the "bytes=0-,0-" substring.

CVE-2015-3890 litespeedtech vulnerability CVSS: 5.0 20 Sep 2017, 18:29 UTC

Use-after-free vulnerability in Open Litespeed before 1.3.10.

CVE-2012-4871 litespeedtech vulnerability CVSS: 4.3 06 Sep 2012, 21:55 UTC

Cross-site scripting (XSS) vulnerability in service/graph_html.php in the administrator panel in LiteSpeed Web Server 4.1.11 allows remote attackers to inject arbitrary web script or HTML via the gtitle parameter.

CVE-2010-2333 litespeedtech vulnerability CVSS: 5.0 18 Jun 2010, 20:30 UTC

LiteSpeed Technologies LiteSpeed Web Server 4.0.x before 4.0.15 allows remote attackers to read the source code of scripts via an HTTP request with a null byte followed by a .txt file extension.

CVE-2004-0112 litespeedtech vulnerability CVSS: 5.0 23 Nov 2004, 05:00 UTC

The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read.