Vulnerabilities included an Unauthenticated Stored Cross-Site Scripting vulnerability that could be used to take over a site
Wordfence-Logo.png (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVmXNh4SYRgFW3MKwGs6Sp-cJW5q0Twr4ZPCgrN5j5FPk3kWDcV1-WJV7CgZMcN1CXcnbswDHMW54YmdK7rl57rW7d8z5K4w9rz3N18C8wbjHgNBW68l7f37JG78sW6-x3Pm7_PFPxW77x6gg1kV1YSVzmCRs2y4HsXW7hJb2H7wbt2vW1Q7-5_97L93SW5DqyT13sYKbdMmCWb9TnZVhW1RhckD956xT1W4JL-1g9gkb19W6Kjsnp1s9WL7VK-lbD15bbdf3nvT1 )
042423_01.2 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVmXNh4SYRgFW3MKwGs6Sp-cJW5q0Twr4ZPCgrN5j5FQQ3kWFJV1-WJV7CgZnbW6jF86k3W649pW3dxY-R8vS0KvVGPFT-4BRtN3W3SBbwd2szMD2N3ckgqgPPPBzW7LNf3_3W27qVW1kSHc023PhTVW700VV-16kN0kW8BlywK25hLMBW8sz0SY68BWB7W3Ws4ck92HTxdW81wg1r6N8d78Vpy3X72SdqdVW7r66VC7wvYHBW59PRdN3YX11dW5WYsG52sn9C5W2Y02MP5dv2NCW1Kq-jB98jy7sW6DwP006X6n79W7yH1ms8pPVptW4FYPRM6sng98W4G60P_2rnpt7W4S-ybr5nn_gdW3R1Jwr98h49SW6lDHqw82hQ1rW1nVmZq6brdLQ3cnm1 )
On March 20, 2023, the Wordfence Threat Intelligence team began the responsible disclosure process for two vulnerabilities in Shield Security, a security plugin with over 50,000 installations. One of these vulnerabilities allowed unauthenticated attackers to inject malicious JavaScript into an administrator dashboard in some configurations, while another allowed authenticated attackers to spoof log entries into the same dashboard, which could also be used to exploit the first vulnerability in configurations where the unauthenticated technique was not viable.
We received a response and sent over full disclosure, and a patched version, 17.0.18, was released the same day.
Wordfence Premium (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVmXNh4SYRgFW3MKwGs6Sp-cJW5q0Twr4ZPCgrN5j5FPX3kWDQV1-WJV7CgLJBW1_5bmN1M4JfZVg_Rfs4zm06dW3XWh531wvzTkW1Y26Rr2wTxpnW3YPB_Q5DYjgwW6Wwsfg1PwHDYW2GWFhm3_QSwfW6468MC3nX6MXLCpF2Cs6qwW18SpNX879_3zW2hgtSn4MPKjJW5VNWVC4Sx2wMW1S1Yxz7KstWrVjqBbv2XsW3CW931n2g9l9_0FVr9rwk8MgTrlW8krZGL4-V4NCW74NBTG7K0mFHW3gVxxf5C6_tqW9jHY755RVCdr34cm1 ) , Care (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVmXNh4SYRgFW3MKwGs6Sp-cJW5q0Twr4ZPCgrN5j5FPX3kWDQV1-WJV7CgzVTW6QTyZr34-JvkVrCQxz6Q3QwbN4zy8v4Zw_yNW1Vfr5H4fyXqdW34KTsY4h_zdWW6gBJ042v0mVcV270NB2kbDMBW4jf9Y47VPshgN4-YN37mFT2cW91ng-J2cNqsbW8dtcyt4dYtq1W22g5bg5PSRjRN343hhbC6hNnN48FVBj2KP_KW80b_C-7zXLS4W8y1grz9l_J4LW3L6RP96XH35KW15qSBj5rPgZ8W4QBnn_6XGPvTW8NXtG67YsbTH3pqT1 ) , and Response (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVmXNh4SYRgFW3MKwGs6Sp-cJW5q0Twr4ZPCgrN5j5FPX3kWDQV1-WJV7CgXcHW1_NXcf8ywP4xW7dCGqY6X1hRBW3YyGJy7z_DttW4pgRlH1ZyfMzV4-tl449hNcQW8HKvnP7wSQs4W1X1M8v7ssN4DW1RQqGL5tBvnvV_hsgg69HPdwW8cDLkh2SrMx_W65fZ1D8CTQdlW88Ds464dF_-fW8mk1d1568By3W4LhRPR16tJjqW4Z9Q4h8J4Wx0W3gVMhw5YRGM3W5gf0yv8d9LZDVnDwWB4VXqVgN55HYDZ_mvG9W6cXWRw1yf8nH362R1 ) users received a firewall rule to protect against any exploits targeting this vulnerability on March 20, 2023. Sites still using the free version of Wordfence received the same protection on April 19, 2023.
This email content has also been published on our blog (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVmXNh4SYRgFW3MKwGs6Sp-cJW5q0Twr4ZPCgrN5j5FQQ3kWFJV1-WJV7CgZnbW6jF86k3W649pW3dxY-R8vS0KvVGPFT-4BRtN3W3SBbwd2szMD2N3ckgqgPPPBzW7LNf3_3W27qVW1kSHc023PhTVW700VV-16kN0kW8BlywK25hLMBW8sz0SY68BWB7W3Ws4ck92HTxdW81wg1r6N8d78Vpy3X72SdqdVW7r66VC7wvYHBW59PRdN3YX11dW5WYsG52sn9C5W2Y02MP5dv2NCW1Kq-jB98jy7sW6DwP006X6n79W7yH1ms8pPVptW4FYPRM6sng98W4G60P_2rnpt7W4S-ybr5nn_gdW3R1Jwr98h49SW6lDHqw82hQ1rW1nVmZq6brdLQ3cnm1 ) and you're welcome to post a comment there if you'd like to join the conversation. Or you can read the full post in this email.
Vulnerability Summary From Wordfence Intelligence
Description:Shield Security <= 17.0.17 - Unauthenticated Stored Cross-Site Scripting (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVmXNh4SYRgFW3MKwGs6Sp-cJW5q0Twr4ZPCgrN5j5FPD5js6JV3Zsc37CgY4gW16G9GB9dJlgcW7hLHL31-rcTrN7x9G38l7Q7zW8tNlgC8jjnSNW5LDQ0j5rbqh1W4TZtN67TJds_W5BsyzZ48p0N-N1Qm2ZW79Ny9N5GKdSshrCNNW1yCd_94S9Y3vW3G3f7v5w-t7KVC-VkN100Hx5W85JTBM4wGDDQW2vK2nQ4T7mLpVNPjVs35tKXzW3zkXFF1wmx14W3XTWjV4-MfHBW2s9Ds297fHBDW6bp8r86rKbhZVyNYBm7c4tSpW92lDpK4QMjg0W3QkHZw7vmDc9W4gytRv8_5N9bW2Dl1VR6ygw9GW4NWpQX4BV5sjW5-0KD651Jh9TW6bjlKd1rp0QfW3mXTj66zg7YnW1hnRn28r-NLGW3WSYTD86_9lFW4SPcJk7Dc-8ZN5r7-SMrlvDkW6vrVKG2WXWJKW1T6rqM29wh5W3g881 )
Affected Plugin: Shield Security – Smart Bot Blocking & Intrusion Prevention (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVmXNh4SYRgFW3MKwGs6Sp-cJW5q0Twr4ZPCgrN5j5FPX3kWDQV1-WJV7CgFm8W1qk8LP2HF-_FW1CTZxH6hGBPBW6325sJ81lWvzW9cqz3C4F4cjwW5zYt3l4_46t6W19TShY2m1MS-W6brBDv5lMG7jW5xmLYH9htn1xW6txZnv3-By8TN5_x7sQ1xPX-W8h3NSP3Nkz6vW8LFK2B3DNmjZW7mxxvh4llvfCW46RZ_g2p0yMcW1sHRlb4LvfrlW3R79bb7hc2rLW288KXx3fClZTW6mBNDl45Ll8yN49PLM5TQKDkW1pcFNw21Ry763c621 )
Plugin Slug: wp-simple-firewall
Affected Versions: <= 17.0.17
CVE ID: CVE-2023-0992 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVmXNh4SYRgFW3MKwGs6Sp-cJW5q0Twr4ZPCgrN5j5FPX3kWDQV1-WJV7CgKwPW7kZQN45FSFdwN2yMC8SKlmZDW6K6LBk8RWBvrW69XjCM35xt7JV7zQZF9lYQjVVVbj5Q4ryZ5BN1WMlj-Wgnp6VjZc382vxF3VVc1W0G6crhmsMCFBdLrNPk5W2wPmN53p63NnVXhxs529MQ9TW67PQzf4LYYgNN2gXZb8BfQgwN8SzkBcDM0D_VbJrMC5FNcfKW5MXVF92D9j23W2knym45kK1l4W3sq61b308CGXVs94QL1K87vQ38jT1 )
CVSS Score: 7.2 (High)
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVmXNh4SYRgFW3MKwGs6Sp-cJW5q0Twr4ZPCgrN5j5FQw3kWFpV1-WJV7CgChjW5zPX4N42NkvfW2vWH376fGJkTN7JhRq8-Wy5kW38hFH-1dFnfdW4_48Cf5Gfb0JW7qBw9s5XZFdBVfq-882yGB_QW3Xxrs419w-pnN5KkbrVTwF-ZN2ZQP-3SC1rrW8GP2m87pxWzQW13WcH_3j3Qq9W8GMr8X83klCWW3R0G4t402LvHW2VTRWw39P-3SW44zVJc1llvWwW56Ng4l58rTmDW8ykQRG8Y3Hr4W88qqw31jYryxN8jvF6CJGN5JW3l6zzh5V9v53W2dkrvj28l5j9W2kd4nM93D_7DW1385v06Mg_Bq34Sq1 )
Researcher/s: Ramuel Gall (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVmXNh4SYRgFW3MKwGs6Sp-cJW5q0Twr4ZPCgrN5j5FQw3kWFpV1-WJV7CgPBVW6hZ2Lh8FRn5CW81Vrf22hCLcDW1PYcyn4h2RJJW1R1KFF9cPytwVkS89l1YHGQhW8JXjqL4Q54XxN33Y69N9r9SyW6lxxCt75VzBWV5xnYC2KgMtLW5_nF2B4BMyPgW7c3kcx3-dwXgW7ZWQp12L72YPW347cx1424VZ0W5x8FDZ6Dpy61W7f6xkw2sxGtTW7hZ0Nt97k8kGW18jJRT92GL-VVYx2Fx38WVDVW1rrrh33zrsQPW2Ct9gD5tFPrTW8BFNjS5ncLCSN20B0chlnd3zW6dYBrC2VBYqMW11vPV411zlFf37Sz1 )
Fully Patched Version: 17.0.18
The Shield Security plugin for WordPress is vulnerable to stored Cross-Site Scripting in versions up to, and including, 17.0.17 via the 'User-Agent' header. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Description: Shield Security <= 17.0.17 - Missing Authorization (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVmXNh4SYRgFW3MKwGs6Sp-cJW5q0Twr4ZPCgrN5j5FPk5js6pV3Zsc37CgQ-3N8hvbRs6pG8kW48qJ4X8N3QDLW7vHfLS4XdkngW4glCDv1GzJY7W1rG2Gs4c9QzLW7LxP_t6lC4v8W446vgx3KsqZ3W5bmNvc2_nSdFW4CBfn79j4J5-W4yVKrv7nMJSsV3vfrB3CY3F7W5hHRKl4P1QttW2PvG3k6YQ5kKW8vhWvW29_w7-W8fSNnf4S5LP_W8b_zt68pd02FW91kMGF8-WrnzN1p0BkwwyrmZW7kHwm_75ftChW4VYbtG9581YyW5d1lhW8CsZ0DW29ljPK4jK0c8W4v7jM75FGtMBVcLVDQ1vs9gKW2MlCv25vfHbfW90jZQj4KmYqMW3llYV-4XwzcBW79KJml3vVqDCW2GN22x7RCsWwN3q7gBdDYymYW2sm49B43QxRkW19P_mL5y1YYb3fmz1 )
Affected Plugin: Shield Security – Smart Bot Blocking & Intrusion Prevention (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVmXNh4SYRgFW3MKwGs6Sp-cJW5q0Twr4ZPCgrN5j5FPX3kWDQV1-WJV7CgFm8W1qk8LP2HF-_FW1CTZxH6hGBPBW6325sJ81lWvzW9cqz3C4F4cjwW5zYt3l4_46t6W19TShY2m1MS-W6brBDv5lMG7jW5xmLYH9htn1xW6txZnv3-By8TN5_x7sQ1xPX-W8h3NSP3Nkz6vW8LFK2B3DNmjZW7mxxvh4llvfCW46RZ_g2p0yMcW1sHRlb4LvfrlW3R79bb7hc2rLW288KXx3fClZTW6mBNDl45Ll8yN49PLM5TQKDkW1pcFNw21Ry763c621 )
Plugin Slug: wp-simple-firewall
Affected Versions: <= 17.0.17
CVE ID: CVE-2023-0993 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVmXNh4SYRgFW3MKwGs6Sp-cJW5q0Twr4ZPCgrN5j5FPX3kWDQV1-WJV7CgQGgN6T3pSTZW1ftW2byPb87QLJJgW1f7RwS6dBWshN489vj1Lj4xBW22zVDb67PCD5W3wwXpq4FKvf-N1fJlNTwXYsSW3m4ZTt8yR2jHW5yqBTP2FSnbpW2Td9n28SBbHJW6w-w-36TtMj6VKg79Y28CfQjW5Jvw8J85QsbLW5MH-vd5MgFtCN7VnZW3W4KJ_W5jd_767BBgktVXHSs42c0z_vW4JngRH7110d7W7-6NKK8nVfdGW3Y_Q0B92Xxyp2tM1 )
CVSS Score: 4.3 (Medium)
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVmXNh4SYRgFW3MKwGs6Sp-cJW5q0Twr4ZPCgrN5j5FQw3kWFpV1-WJV7CgLvqW9kDpBl7nzrwkW1Y724Y3spYbwW753vmv4q-TD7W8pq7lB9jn1xxN5F80Y5Kxc7hW73clqr1shZDmW6tvWZD3MBMVrW5dnmXk2dDgC1W7-X3Xk68rbFDN612H33FdWbtW5VlyTY5tn1xJW3HTL7f4G4s_2W2CFYgm2tM9GCV3wb1-4qsF3YW7X-t288LghvlW42nKp88h7QDlW43rplM2JqVXrW82n-QP5M83KyVWLw8Y3GgyfRW5MVyQ28Z27z2N4_K1btQMnQNW5zzMNQ6PF09GW5Ffb026Kk-mNW1WRTXv6wQ-F_39qs1 )
Researcher/s: Ramuel Gall (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVmXNh4SYRgFW3MKwGs6Sp-cJW5q0Twr4ZPCgrN5j5FQw3kWFpV1-WJV7CgPBVW6hZ2Lh8FRn5CW81Vrf22hCLcDW1PYcyn4h2RJJW1R1KFF9cPytwVkS89l1YHGQhW8JXjqL4Q54XxN33Y69N9r9SyW6lxxCt75VzBWV5xnYC2KgMtLW5_nF2B4BMyPgW7c3kcx3-dwXgW7ZWQp12L72YPW347cx1424VZ0W5x8FDZ6Dpy61W7f6xkw2sxGtTW7hZ0Nt97k8kGW18jJRT92GL-VVYx2Fx38WVDVW1rrrh33zrsQPW2Ct9gD5tFPrTW8BFNjS5ncLCSN20B0chlnd3zW6dYBrC2VBYqMW11vPV411zlFf37Sz1 )
Fully Patched Version: 17.0.18
The Shield Security plugin for WordPress is vulnerable to Missing Authorization on the 'theme-plugin-file' AJAX action in versions up to, and including, 17.0.17. This allows authenticated attackers to add arbitrary audit log entries indicating that a theme or plugin has been edited, and is also a vector for Cross-Site Scripting via CVE-2023-0992.
Vulnerability Analysis
The Shield Security plugin includes a number of features, including an audit log that records certain types of suspicious activity, such as plugin and theme installation, modification, post deletion, and other types of activity that might impact the site. While most of these events require authentication or higher privileges in order to trigger, we found that certain events could be triggered by unauthenticated users. In particular, failed attempts to authenticate using application passwords, new user registrations, and spam activity are among the actions recorded for unauthenticated users.
The audit log records metadata about the client that performed the logged activity, including the client’s User-Agent, which can be accessed by clicking the “Meta” tag icon on an audit log entry. Unfortunately, the metadata was not escaped when it was output. While most of the metadata collected about a request has a very strict format and can only be spoofed to a limited extent, User-Agent strings are alphanumeric, and we were able to inject a script in an iframe in the User-Agent header that fired when an administrator viewed an event entry:
shieldalert-1024x454 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVmXNh4SYRgFW3MKwGs6Sp-cJW5q0Twr4ZPCgrN5j5FQQ3kWFJV1-WJV7CgZnbW6jF86k3W649pW3dxY-R8vS0KvVGPFT-4BRtN3W3SBbwd2szMD2N3ckgqgPPPBzW7LNf3_3W27qVW1kSHc023PhTVW700VV-16kN0kW8BlywK25hLMBW8sz0SY68BWB7W3Ws4ck92HTxdW81wg1r6N8d78Vpy3X72SdqdVW7r66VC7wvYHBW59PRdN3YX11dW5WYsG52sn9C5W2Y02MP5dv2NCW1Kq-jB98jy7sW6DwP006X6n79W7yH1ms8pPVptW4FYPRM6sng98W4G60P_2rnpt7W4S-ybr5nn_gdW3R1Jwr98h49SW6lDHqw82hQ1rW1nVmZq6brdLQ3cnm1 )
While this exploit does technically require user interaction, it can be considered “Passive” user interaction, that is, it does not require tricking the administrator into performing any actions they might not have performed otherwise. Depending on the payload used, an attacker could use the script executing in the administrator’s browser to create a new administrator account under their control. Additionally, this exploit can be automated, and can be exploited by unauthenticated attackers via a variety of vectors, at least one of which is likely to be present in most common site configurations. As such it earns its High severity rating.
The second vulnerability was much lower in severity and consisted of a missing authorization check on the ‘edit-theme-plugin-file’ AJAX action, which is used to record edits to plugin or theme files. The primary consequence of this is that an authenticated attacker can spoof an audit log entry indicating that any file belonging to any plugin or theme on the site was edited. While this is primarily a nuisance, since it can be used to create audit log entries it is yet another vector to exploit the aforementioned Cross-Site Scripting vulnerability.
Disclosure Timeline
March 20, 2023 – Wordfence Premium (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVmXNh4SYRgFW3MKwGs6Sp-cJW5q0Twr4ZPCgrN5j5FPX3kWDQV1-WJV7CgLJBW1_5bmN1M4JfZVg_Rfs4zm06dW3XWh531wvzTkW1Y26Rr2wTxpnW3YPB_Q5DYjgwW6Wwsfg1PwHDYW2GWFhm3_QSwfW6468MC3nX6MXLCpF2Cs6qwW18SpNX879_3zW2hgtSn4MPKjJW5VNWVC4Sx2wMW1S1Yxz7KstWrVjqBbv2XsW3CW931n2g9l9_0FVr9rwk8MgTrlW8krZGL4-V4NCW74NBTG7K0mFHW3gVxxf5C6_tqW9jHY755RVCdr34cm1 ) , Care (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVmXNh4SYRgFW3MKwGs6Sp-cJW5q0Twr4ZPCgrN5j5FPX3kWDQV1-WJV7CgzVTW6QTyZr34-JvkVrCQxz6Q3QwbN4zy8v4Zw_yNW1Vfr5H4fyXqdW34KTsY4h_zdWW6gBJ042v0mVcV270NB2kbDMBW4jf9Y47VPshgN4-YN37mFT2cW91ng-J2cNqsbW8dtcyt4dYtq1W22g5bg5PSRjRN343hhbC6hNnN48FVBj2KP_KW80b_C-7zXLS4W8y1grz9l_J4LW3L6RP96XH35KW15qSBj5rPgZ8W4QBnn_6XGPvTW8NXtG67YsbTH3pqT1 ) , and Response (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVmXNh4SYRgFW3MKwGs6Sp-cJW5q0Twr4ZPCgrN5j5FPX3kWDQV1-WJV7CgXcHW1_NXcf8ywP4xW7dCGqY6X1hRBW3YyGJy7z_DttW4pgRlH1ZyfMzV4-tl449hNcQW8HKvnP7wSQs4W1X1M8v7ssN4DW1RQqGL5tBvnvV_hsgg69HPdwW8cDLkh2SrMx_W65fZ1D8CTQdlW88Ds464dF_-fW8mk1d1568By3W4LhRPR16tJjqW4Z9Q4h8J4Wx0W3gVMhw5YRGM3W5gf0yv8d9LZDVnDwWB4VXqVgN55HYDZ_mvG9W6cXWRw1yf8nH362R1 ) users receive a firewall rule to provide protection against any exploits that may target this vulnerability. We responsibly disclose the plugin to the developer, who responds quickly and releases a patch in version 17.0.18.
April 19, 2023 – The firewall rule becomes available to all Wordfence users.
Conclusion
In today’s post, we detailed a High Severity Cross-Site Scripting vulnerability in Shield Security. We also detailed a lower-severity issue allowing authenticated attackers to spoof audit log entries indicating that plugin and theme files had been edited. These vulnerabilities have been fully patched in version 17.0.18.
Wordfence Premium (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVmXNh4SYRgFW3MKwGs6Sp-cJW5q0Twr4ZPCgrN5j5FPX3kWDQV1-WJV7CgLJBW1_5bmN1M4JfZVg_Rfs4zm06dW3XWh531wvzTkW1Y26Rr2wTxpnW3YPB_Q5DYjgwW6Wwsfg1PwHDYW2GWFhm3_QSwfW6468MC3nX6MXLCpF2Cs6qwW18SpNX879_3zW2hgtSn4MPKjJW5VNWVC4Sx2wMW1S1Yxz7KstWrVjqBbv2XsW3CW931n2g9l9_0FVr9rwk8MgTrlW8krZGL4-V4NCW74NBTG7K0mFHW3gVxxf5C6_tqW9jHY755RVCdr34cm1 ) , Care (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVmXNh4SYRgFW3MKwGs6Sp-cJW5q0Twr4ZPCgrN5j5FPX3kWDQV1-WJV7CgzVTW6QTyZr34-JvkVrCQxz6Q3QwbN4zy8v4Zw_yNW1Vfr5H4fyXqdW34KTsY4h_zdWW6gBJ042v0mVcV270NB2kbDMBW4jf9Y47VPshgN4-YN37mFT2cW91ng-J2cNqsbW8dtcyt4dYtq1W22g5bg5PSRjRN343hhbC6hNnN48FVBj2KP_KW80b_C-7zXLS4W8y1grz9l_J4LW3L6RP96XH35KW15qSBj5rPgZ8W4QBnn_6XGPvTW8NXtG67YsbTH3pqT1 ) , and Response (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVmXNh4SYRgFW3MKwGs6Sp-cJW5q0Twr4ZPCgrN5j5FPX3kWDQV1-WJV7CgXcHW1_NXcf8ywP4xW7dCGqY6X1hRBW3YyGJy7z_DttW4pgRlH1ZyfMzV4-tl449hNcQW8HKvnP7wSQs4W1X1M8v7ssN4DW1RQqGL5tBvnvV_hsgg69HPdwW8cDLkh2SrMx_W65fZ1D8CTQdlW88Ds464dF_-fW8mk1d1568By3W4LhRPR16tJjqW4Z9Q4h8J4Wx0W3gVMhw5YRGM3W5gf0yv8d9LZDVnDwWB4VXqVgN55HYDZ_mvG9W6cXWRw1yf8nH362R1 ) users received a firewall rule to protect against any exploits targeting this vulnerability on March 20, 2023. Sites still using the free version of Wordfence received the same protection on April 19, 2023.
If you know a friend or colleague who is using the Shield Security plugin on their site, we highly recommend forwarding this advisory to them as the Cross-Site Scripting vulnerability can allow Unauthenticated attackers to execute malicious JavaScript in an administrator’s browser, which can lead to site takeover.
If you are a security researcher, you can responsibly disclose your finds to us and obtain a CVE ID (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVmXNh4SYRgFW3MKwGs6Sp-cJW5q0Twr4ZPCgrN5j5FPD3kWDwV1-WJV7Cg-2yVg_L_13Ph7DWW4nNcc16n6y5XW1ws1YB88Ysz0W4G9Pr_8dlcrmW2L466150f7x9W8BnJ7Q1nJ0cbW3wvgwn3ZtWtNW8QMfxH6RWt5nW3tPN5f39CPh6W60Jzzv498vGsW29vTrB2fSWx-W7SyL6H3DGHhWW1W23yw6HwZLJW4JSJ736FZ_qQW29lcKs4rZthdW5fRc3K8CbpgBVYzcM15jt6L4W5nM3b77jZbBK3fbr1 ) and get your name on the Wordfence Intelligence leaderboard (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVmXNh4SYRgFW3MKwGs6Sp-cJW5q0Twr4ZPCgrN5j5FQc3kWF5V1-WJV7CgXjmW2q2Tdn5qGKgbW5rsdh237LdsMW8q7ZZ06wXLS7W4_yzkm8rVC4LVK9qty8nBZPjW8k34h3414K57V827Xt7nFGF5W4NjBjJ2bQjmhN51qdmkJXKP0W1_pRyK1P1P1TW6s4BZr7HzKNNW9hV08Q39P_bWW71Jwfy5R2XMjW12FTzX2FYgYmW79032_2rntkNW5MfdLT2mlXgwW8fLKGF1s5R4qVxJ9Dc4NdN7tW195J2F9dgQx_N64qqDrVjR-DW5VCzcl5N6QWgN54d4TwPqrbV34X51 ) . Thanks to Paul Goodchild from Shield Security for patching the issue quickly.
The Full Product Lineup:
wf-stacked-free-1 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVmXNh4SYRgFW3MKwGs6Sp-cJW5q0Twr4ZPCgrN5j5FPX3kWDQV1-WJV7CgHPjN8zjCkg9CSyHW6NdVyF9hSWksW7dNhV45qBW_TW5mb6Fz37GR7WW4pY8XS4Bq4PPW8cC3S24mb3TtW5-WTPw7tC-YWW5BqDvM88Pb37W879C8N62SDDfW8y76DQ61KGMsW975cyT1BtgwpN2P5R5J2X97dVR-TQ53nXR_xW96rjGF5TBmH5VwRs5T8fCY4wVmhSRJ80_pkMW9hc3yk33TzYVW7m1kbt13XvpGW8G7xsR7BjFHNW75V0Rc641PxC31Vv1 )
wf-stacked-premium-1 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVmXNh4SYRgFW3MKwGs6Sp-cJW5q0Twr4ZPCgrN5j5FPX3kWDQV1-WJV7CgQybW1Pfhvz85vMGlW22GGDs6GtgwJW2sWg5h58-8ycW83wy647P_-rhW8hLQV-1xXGBzW9hpR_Y5fbNVbN3Kkwd9lNg1gW8dPgy_3Q9ldJW634lhd4SN8cDW1K_dpn86Xx9wW8kdzwG3Vqt5HW8Z4c0s72qRF-W7KMNQ86n1hSFW3XN8tk6FwF7bW2WgSk44mvm-RW7JV5-k1wXwMPW7F-qrj3CQ90pW62hn7L2yBr1kW6f7vt26QF89TW7p6zWc3Dl_3434qS1 )
wf-stacked-care-3 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVmXNh4SYRgFW3MKwGs6Sp-cJW5q0Twr4ZPCgrN5j5FPX3kWDQV1-WJV7CgZyqW38FsZL3lXKryVxMB1j4MvHPjW6Y2D3s83nwxJW5bDHFR7ZkrWsW1_Xz6l735ljmVjzwys8vcDpdW10tDwV2pv222W99GKDM4Z-6bZVtxp1B5s_xMtW88Rpgx5gHySRVN9KY24J0xYqW1MVRBR7wNfxXW5D4fzc8JxlMvW4wH1Kv96Gvs2F3D5sHT7CFNW7cSTw28JMxrgW41XRTY3w2NmFMSrSVbh3KgFW1V0TzV5d0mSNW7CtsRS93Bbwf2s71 )
wf-stacked-response-2 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVmXNh4SYRgFW3MKwGs6Sp-cJW5q0Twr4ZPCgrN5j5FPX3kWDQV1-WJV7CgXcHW1_NXcf8ywP4xW7dCGqY6X1hRBW3YyGJy7z_DttW4pgRlH1ZyfMzV4-tl449hNcQW8HKvnP7wSQs4W1X1M8v7ssN4DW1RQqGL5tBvnvV_hsgg69HPdwW8cDLkh2SrMx_W65fZ1D8CTQdlW88Ds464dF_-fW8mk1d1568By3W4LhRPR16tJjqW4Z9Q4h8J4Wx0W3gVMhw5YRGM3W5gf0yv8d9LZDVnDwWB4VXqVgN55HYDZ_mvG9W6cXWRw1yf8nH362R1 )
wf-logo-intelligence-h-800 (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVmXNh4SYRgFW3MKwGs6Sp-cJW5q0Twr4ZPCgrN5j5FPD3kWDwV1-WJV7CgJBzW6NwNqg79twVMN17Qd6PBVmBKW5QXKQ4997LpRW4gM7Rh3QQHgvW98gBWq42rGnTW6hytkc6-rPKtW7dVfHJ1VjM5cW1QRnTF1ZfS9yW2tkynR5WTJKGW4Df6tb8Z5tH9W2PGmzD12Fq8sVXWfXp5D8YmMW1_0BRj5fg4K9W7T8q3c46Pw0rW4ZyfbF26tvKNW6YDbbH3Rs34SW1SXG6-2RMXshW7mkj5_4g6f4V3bd91 )
logo-defiant (
https://email.wordfence.com/e3t/Ctc/GC+113/cwG7R04/VVmXNh4SYRgFW3MKwGs6Sp-cJW5q0Twr4ZPCgrN5j5FPk3kWDcV1-WJV7CgLMMW1p8K675gsGk1W1mMb8V5k4Jl4W4Zglp98wHb8DVkphMY6wcBQWW1g9MLm8YYwfKW8QsYYt97b73NW6yMZPk4HxcyCVCXWSJ5DhK2tN731KSD8MZTMN6c0lqp5DszcW7kSD9H6bLWnhW3S_pSB5J78tjW5rRK9p98wtrxW8nz-572mFp4RMy35GWsS2hLW67gwVY5Fnbdt31wW1 )
Defiant, Inc., 1700 Westlake Ave N STE 200, Seattle, WA 98109, United States
Unsubscribe (
https://email.wordfence.com/hs/manage-preferences/unsubscribe-all?languagePreference=en&d=Vn8Pp4892TtnVsxx1M3JN_XyW41Rcn-4h29fmN6J4V3WmWcMMW5S7mCV7VQ34DV25Bld5C_rTMW8mNPBz5kN6dxN99D7Lw1yf0NN31jrjMS_xZrV_Ntsm7RS9lXn5Vt5p81b3&v=3&_hsenc=p2ANqtz-_i8WnKxoTBj7R3_g8BRWTZCpN0JPNhustCiqoMvQ8pshKeOFdkbRR0IeAmttAgX9uNdaHkKrNoCu5AfopQSCdlKUKOyA&_hsmi=255681780 )
Manage preferences (
https://email.wordfence.com/hs/manage-preferences/unsubscribe?languagePreference=en&d=Vn8Pp4892TtnVsxx1M3JN_XyW41Rcn-4h29fmN6J4V3WmWcMMW5S7mCV7VQ34DV25Bld5C_rTMW8mNPBz5kN6dxN99D7Lw1yf0NN31jrjMS_xZrV_Ntsm7RS9lXn5Vt5p81b3&v=3&_hsenc=p2ANqtz-_i8WnKxoTBj7R3_g8BRWTZCpN0JPNhustCiqoMvQ8pshKeOFdkbRR0IeAmttAgX9uNdaHkKrNoCu5AfopQSCdlKUKOyA&_hsmi=255681780 )
You're receiving this email because you signed up to the Wordfence WordPress security mailing list.
Received on Tue Apr 25 2023 - 15:48:37 CEST