CVE-2022-0953
WordPress vulnerability analysis and mitigation

Overview

CVE-2022-0953 affects the Anti-Malware Security and Brute-Force Firewall WordPress plugin versions before 4.20.96. The vulnerability was discovered and reported by Taurus Omar, with public disclosure occurring on March 29, 2022 (WPScan).

Technical details

The vulnerability is a Reflected Cross-Site Scripting (XSS) issue that occurs because the plugin does not properly sanitize and escape the QUERY_STRING before outputting it back in an admin page. This vulnerability is classified as CWE-79 and has been assigned a CVSS score of 3.4 (low severity) (WPScan).

Impact

The vulnerability could allow attackers to execute malicious scripts in browsers that do not encode certain characters, potentially leading to unauthorized actions being performed in the context of the authenticated administrator session (WPScan).

Mitigation and workarounds

Users should upgrade to version 4.20.96 or later of the Anti-Malware Security and Brute-Force Firewall plugin to address this vulnerability (WPScan).

Additional resources


SourceThis report was generated using AI

Related WordPress vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-13604HIGH7.2
  • security-malware-firewall
NoYesDec 09, 2025
CVE-2025-13642MEDIUM5.4
  • wp-user-avatar
NoYesDec 09, 2025
CVE-2025-13924MEDIUM4.3
  • advanced-product-fields-for-woocommerce
NoYesDec 09, 2025
CVE-2025-13071N/AN/A
  • custom-admin-menu
NoNoDec 09, 2025
CVE-2025-13070N/AN/A
  • csv-to-sorttable
NoNoDec 09, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management