Aruba HiSpeed Cache (aruba-hispeed-cache) WordPress...
Moderate severity
Unreviewed
Published
Feb 23, 2026
to the GitHub Advisory Database
•
Updated Feb 23, 2026
Description
Published by the National Vulnerability Database
Feb 23, 2026
Published to the GitHub Advisory Database
Feb 23, 2026
Last updated
Feb 23, 2026
Aruba HiSpeed Cache (aruba-hispeed-cache) WordPress plugin versions prior to 3.0.5 contain a cross-site request forgery (CSRF) vulnerability affecting multiple administrative AJAX actions. The handlers for ahsc_reset_options, ahsc_debug_status, and ahsc_enable_purge perform authentication and capability checks but do not verify a WordPress nonce for state-changing requests. An attacker can induce a logged-in administrator to visit a malicious webpage that submits forged requests to admin-ajax.php, resulting in unauthorized resetting of plugin settings, toggling of the WordPress WP_DEBUG configuration, or modification of cache purging behavior without the administrator’s intent.
References