Lucene search

K
GetshieldsecurityShield Security

6 matches found

CVE
CVE
added 2022/02/21 11:15 a.m.78 views

CVE-2022-0211

The Shield Security WordPress plugin before 13.0.6 does not sanitise and escape admin notes, which could allow high privilege users to perform Cross-Site Scripting attacks even when the unfiltered_html is disallowed.

4.8CVSS4.8AI score0.00214EPSS
CVE
CVE
added 2023/06/09 6:15 a.m.70 views

CVE-2023-0992

The Shield Security plugin for WordPress is vulnerable to stored Cross-Site Scripting in versions up to, and including, 17.0.17 via the 'User-Agent' header. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an in...

7.2CVSS5AI score0.34496EPSS
CVE
CVE
added 2024/08/26 6:15 a.m.59 views

CVE-2024-7313

The Shield Security WordPress plugin before 20.0.6 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.

6.1CVSS5.8AI score0.50538EPSS
CVE
CVE
added 2024/01/31 6:15 p.m.41 views

CVE-2024-22163

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Shield Security Shield Security – Smart Bot Blocking & Intrusion Prevention Security allows Stored XSS.This issue affects Shield Security – Smart Bot Blocking & Intrusion Prevention Security: from ...

7.1CVSS6.4AI score0.00083EPSS
CVE
CVE
added 2024/02/05 10:15 p.m.40 views

CVE-2023-6989

The Shield Security – Smart Bot Blocking & Intrusion Prevention Security plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 18.5.9 via the render_action_template parameter. This makes it possible for unauthenticated attacker to include and execute PHP f...

9.8CVSS9.5AI score0.75435EPSS
CVE
CVE
added 2023/06/09 6:15 a.m.35 views

CVE-2023-0993

The Shield Security plugin for WordPress is vulnerable to Missing Authorization on the 'theme-plugin-file' AJAX action in versions up to, and including, 17.0.17. This allows authenticated attackers to add arbitrary audit log entries indicating that a theme or plugin has been edited, and is also a v...

4.3CVSS5AI score0.34496EPSS