Vulnerability Report
Plugin Medium Patch path listed

iThemes Security <= 5.6.1 - Stored Cross-Site Scripting

The iThemes Security for WordPress is vulnerable to Stored Cross-Site Scripting via multiple parameters in versions up to, and including, 5.6.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. "Security Fix: Updated log output to prevent specific kinds of logged requests from displaying without sanitization. Thanks to Slavco Mihajloski for contacting us about this issue." ~ https://wordpress.org/plugins/better-wp-security/#developers

Quick Answer

This vulnerability is a medium severity with CVSS 6.4 Stored Cross-Site Scripting issue affecting the Plugin Solid Security – Password, Two Factor Authentication, and Brute Force Protection. It affects Versions before 5.6.2 and is fixed in 5.6.2.

Published
Oct 06, 2016
Last Updated
Jan 22, 2024
Slug
better-wp-security
Operational Summary

What the operator needs to know

Patch Status
Patched release is available
Remediation
Update to version 5.6.2, or a newer patched version
Operator Briefing

the tracked vulnerability is tracked for the Plugin Solid Security – Password, Two Factor Authentication, and Brute Force Protection as medium severity with CVSS 6.4. The affected range is Versions before 5.6.2. Update Solid Security – Password, Two Factor Authentication, and Brute Force Protection to 5.6.2 or newer where that version is compatible with the site.

Issue Type
Stored Cross-Site Scripting
Primary Fixed Version
5.6.2
Primary Affected Range
Versions before 5.6.2
Tracking ID
8657003f-da37-4169-9f00-262d7f3d9a9c
Detailed Metadata
Software Type Plugin
Software Slug
better-wp-security View on wordpress.org
CVE No linked CVE entry.
Patched Versions
5.6.2
Affected Versions
Versions before 5.6.2
Related CVE Cluster

Related CVEs for Solid Security – Password, Two Factor Authentication, and Brute Force Protection

These internal links group the same WordPress plugin by CVE, issue type, severity, and patch status so operators and search engines can connect the full vulnerability cluster.

High CVE-2020-36176 7.7.0 Jan 06, 2021
CVE-2020-36176 Solid Security – Password, Two Factor Authentication, and Brute Force Protection Vulnerability

iThemes Security <= 7.6.1 - Broken Password Mechanism

High CVE-2018-7433 6.9.1 Mar 05, 2018
CVE-2018-7433 Solid Security – Password, Two Factor Authentication, and Brute Force Protection Cross-Site Scripting

iThemes Security <= 6.9.0 - Cross-Site Scripting

High CVE-2018-12636 7.0.3 Jun 25, 2018
CVE-2018-12636 Solid Security – Password, Two Factor Authentication, and Brute Force Protection SQL Injection

iThemes Security <= 7.0.2 - Authenticated SQL Injection

High CVE-2012-4263 3.2.5 May 11, 2012
CVE-2012-4263 Solid Security – Password, Two Factor Authentication, and Brute Force Protection Cross-Site Scripting

iThemes Security < 3.2.5 - Cross-Site Scripting

Medium CVE-2012-4264 3.2.5 May 11, 2012
CVE-2012-4264 Solid Security – Password, Two Factor Authentication, and Brute Force Protection Cross-Site Scripting

Better WP Security <= 3.2.4 - Multiple Cross-Site Scripting

Medium CVE-2022-44593 9.3.2 Jun 20, 2024
CVE-2022-44593 Solid Security – Password, Two Factor Authentication, and Brute Force Protection Vulnerability

Solid Security <= 9.3.1 - IP Address Spoofing to Denial of Service

Medium CVE-2023-28786 8.1.5 Mar 27, 2023
CVE-2023-28786 Solid Security – Password, Two Factor Authentication, and Brute Force Protection Vulnerability

iThemes Security <= 8.1.4 - Open Redirection via redirect_to_https

High 3.6.4 Aug 01, 2014
Solid Security – Password, Two Factor Authentication, and Brute Force Protection Stored Cross-Site Scripting

iThemes Security < 3.6.4 - Stored Cross-Site Scripting

Licensing Notices

This record contains material that is subject to copyright

DEFIANT
Copyright 2012-2026 Defiant Inc.

License: Defiant hereby grants you a perpetual, worldwide, non-exclusive, no-charge, royalty-free, irrevocable copyright license to reproduce, prepare derivative works of, publicly display, publicly perform, sublicense, and distribute this software vulnerability information. Any copy of the software vulnerability information you make for such purposes is authorized provided that you include a hyperlink to this vulnerability record and reproduce Defiant's copyright designation and this license in any such copy. Read more