The Shield Security WordPress plugin before 20.0.6 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sat, 17 May 2025 02:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-79

Mon, 26 Aug 2024 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Getshieldsecurity
Getshieldsecurity shield Security
CPEs cpe:2.3:a:getshieldsecurity:shield_security:*:*:*:*:*:wordpress:*:*
Vendors & Products Getshieldsecurity
Getshieldsecurity shield Security
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 26 Aug 2024 06:15:00 +0000

Type Values Removed Values Added
Description The Shield Security WordPress plugin before 20.0.6 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin.
Title Shield Security < 20.0.6 - Reflected XSS
References

cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published:

Updated: 2024-08-26T17:49:48.236Z

Reserved: 2024-07-30T20:08:26.705Z

Link: CVE-2024-7313

cve-icon Vulnrichment

Updated: 2024-08-26T17:49:39.930Z

cve-icon NVD

Status : Analyzed

Published: 2024-08-26T06:15:04.947

Modified: 2025-05-17T02:11:04.260

Link: CVE-2024-7313

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.