CVE-2023-6989

CRITICAL NUCLEI

Getshieldsecurity Shield Security < 18.5.10 - Path Traversal

Title source: rule

Description

The Shield Security – Smart Bot Blocking & Intrusion Prevention Security plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 18.5.9 via the render_action_template parameter. This makes it possible for unauthenticated attacker to include and execute PHP files on the server, allowing the execution of any PHP code in those files.

Exploits (1)

github WORKING POC 4 stars
by halilkirazkaya · poc
https://github.com/halilkirazkaya/cve-poc-garage/tree/main/2023/CVE-2023-6989.md

Nuclei Templates (1)

Shield Security WP Plugin <= 18.5.9 - Local File Inclusion
CRITICALVERIFIEDby s4e-io
Shodan: http.html:/wp-content/plugins/wp-simple-firewall
FOFA: body=/wp-content/plugins/wp-simple-firewall

Scores

CVSS v3 9.8
EPSS 0.6979
EPSS Percentile 98.7%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-22 CWE-98
Status published
Products (2)
getshieldsecurity/shield_security < 18.5.10
paultgoodchild/Shield: Blocks Bots, Protects Users, and Prevents Security Breaches < 18.5.9
Published Feb 05, 2024
Tracked Since Feb 18, 2026