Description
The Shield Security plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'message' parameter in all versions up to, and including, 21.0.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Published: 2026-02-19
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthenticated Reflected Cross‑Site Scripting allowing arbitrary script execution in affected WordPress sites
Action: Apply Patch
AI Analysis

Impact

The Shield Security plugin for WordPress is vulnerable to Reflected Cross‑Site Scripting through the 'message' parameter. Because the plugin does not sanitize or escape this input, an attacker can embed malicious scripts that execute when a victim visits a crafted URL. The impact is the ability to run arbitrary client‑side code in the victim’s browser, enabling session hijacking, cookie theft, or the execution of phishing vectors. The weakness is a classic input validation flaw (CWE‑79).

Affected Systems

The vulnerability affects all releases of Shield Security for WordPress up to and including version 21.0.8, issued by paultgoodchild. Any WordPress site installing the plugin in these or earlier versions is potentially exposed.

Risk and Exploitability

The CVSS score of 6.1 classifies this as moderate‑risk. The EPSS score of less than 1% indicates a low but non‑zero exploitation probability. The vulnerability is unauthenticated and requires only that a victim click a crafted link, which makes it easy to deploy. It is not currently listed in the CISA KEV catalog. To exploit, an attacker needs to host a URL that includes an injected payload in the 'message' parameter and convince a user to click it, which will lead to script execution in the user’s browser. This can be used to compromise user accounts or deface the site.

Generated by OpenCVE AI on April 15, 2026 at 18:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Shield Security plugin to version 21.0.9 or later where the 'message' parameter is properly sanitized and output escaped.
  • If an upgrade is not immediately available, disable or remove any functionality that exposes the 'message' parameter to public requests, such as turning off related processing scripts or setting the plugin to ignore this parameter.
  • Deploy a web application firewall or content‑security‑policy headers on the WordPress site to curb the execution of unexpected scripts and reduce the window of opportunity for exploitation.

Generated by OpenCVE AI on April 15, 2026 at 18:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Feb 2026 01:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 19 Feb 2026 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Paultgoodchild
Paultgoodchild shield: Blocks Bots, Protects Users, And Prevents Security Breaches
Wordpress
Wordpress wordpress
Vendors & Products Paultgoodchild
Paultgoodchild shield: Blocks Bots, Protects Users, And Prevents Security Breaches
Wordpress
Wordpress wordpress

Thu, 19 Feb 2026 05:00:00 +0000

Type Values Removed Values Added
Description The Shield Security plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'message' parameter in all versions up to, and including, 21.0.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Title Shield Security <= 21.0.8 - Unauthenticated Reflected Cross-Site Scripting via 'message' Parameter
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Paultgoodchild Shield: Blocks Bots, Protects Users, And Prevents Security Breaches
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:23:26.711Z

Reserved: 2026-01-01T22:13:21.759Z

Link: CVE-2026-0561

cve-icon Vulnrichment

Updated: 2026-02-19T21:14:53.216Z

cve-icon NVD

Status : Deferred

Published: 2026-02-19T07:17:41.650

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-0561

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T18:15:10Z

Weaknesses