### [CVE-2021-24312](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-24312) ![](https://img.shields.io/static/v1?label=Product&message=WP%20Super%20Cache&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=1.7.3%3C%201.7.3%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-94%20Improper%20Control%20of%20Generation%20of%20Code%20('Code%20Injection')&color=brighgreen) ### Description The parameters $cache_path, $wp_cache_debug_ip, $wp_super_cache_front_page_text, $cache_scheduled_time, $cached_direct_pages used in the settings of WP Super Cache WordPress plugin before 1.7.3 result in RCE because they allow input of '$' and '\n'. This is due to an incomplete fix of CVE-2021-24209. ### POC #### Reference - https://wpscan.com/vulnerability/2142c3d3-9a7f-4e3c-8776-d469a355d62f #### Github No PoCs found on GitHub currently.