Plattform
aruba
Komponente
aruba-hispeed-cache
Behoben in
3.0.5
3.0.5
A Cross-Site Request Forgery (CSRF) vulnerability exists in the Aruba HiSpeed Cache plugin for WordPress, affecting versions up to and including 3.0.4. This flaw allows unauthenticated attackers to potentially reset all plugin settings to their default values by tricking a site administrator into performing a malicious action. The vulnerability stems from a lack of nonce verification within the ahscajaxreset_options() function. A patch is available in version 3.0.5.
Successful exploitation of this CSRF vulnerability could lead to significant disruption of a WordPress site's functionality. An attacker could leverage this to revert customizations made to the Aruba HiSpeed Cache plugin, potentially impacting caching performance and website speed. While the impact isn't catastrophic (no data exfiltration or remote code execution), resetting plugin settings can cause unexpected behavior and require manual intervention to restore the site to its desired configuration. This vulnerability highlights the importance of proper input validation and nonce protection in WordPress plugins to prevent unauthorized modifications.
This vulnerability was publicly disclosed on 2026-04-10. There are currently no known public proof-of-concept exploits available. It is not listed on the CISA KEV catalog. The CVSS score of 4.3 (Medium) indicates a moderate risk, suggesting that exploitation is possible but not highly probable without significant effort.
Websites utilizing the Aruba HiSpeed Cache plugin, particularly those with shared hosting environments or where plugin updates are not performed regularly, are at risk. WordPress administrators who routinely click on links from untrusted sources are also vulnerable.
• wordpress / composer / npm:
grep -r 'ahsc_ajax_reset_options()' /var/www/html/wp-content/plugins/aruba-hispeed-cache/• wordpress / composer / npm:
wp plugin list --status=all | grep aruba-hispeed-cache• wordpress / composer / npm:
wp plugin update aruba-hispeed-cache --alldisclosure
Exploit-Status
EPSS
0.02% (4% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2026-1924 is to immediately upgrade the Aruba HiSpeed Cache plugin to version 3.0.5 or later. If upgrading is not immediately feasible due to compatibility issues or breaking changes, consider implementing a Web Application Firewall (WAF) rule to block requests to the ahscajaxreset_options() endpoint that lack a valid nonce. Additionally, educate site administrators about the risks of clicking on suspicious links and to always verify the authenticity of requests before performing actions. Monitor WordPress access logs for unusual activity targeting the plugin’s AJAX endpoints.
Aktualisieren Sie auf Version 3.0.5 oder eine neuere gepatchte Version
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2026-1924 is a Cross-Site Request Forgery (CSRF) vulnerability affecting the Aruba HiSpeed Cache WordPress plugin versions up to 3.0.4, allowing attackers to reset plugin settings.
You are affected if you are using the Aruba HiSpeed Cache plugin in versions 3.0.4 or earlier. Upgrade to 3.0.5 or later to mitigate the risk.
Upgrade the Aruba HiSpeed Cache plugin to version 3.0.5 or later. Consider WAF rules or restricting admin access as temporary workarounds.
There are currently no confirmed reports of active exploitation, but the vulnerability is publicly known and could be targeted.
Refer to the Aruba Security Advisories page for the latest information: [https://www.arubanetworks.com/assets/security-advisories/](https://www.arubanetworks.com/assets/security-advisories/)
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.