The WP Shamsi plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the deactivate() function hooked via init() in versions up to, and including, 4.1.0. This makes it possible for unauthenticated attackers to deactivate arbitrary plugins on the site. This can be used to deactivate security plugins that aids in exploiting other vulnerabilities.

Project Subscriptions

Vendors Products
Wp Shamsi Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2022-51890 The WP Shamsi plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the deactivate() function hooked via init() in versions up to, and including, 4.1.0. This makes it possible for unauthenticated attackers to deactivate arbitrary plugins on the site. This can be used to deactivate security plugins that aids in exploiting other vulnerabilities.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 08 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
Title WP Shamsi <= 4.1.0 - Missing Authorization to Arbitrary Plugin Deactivation
Weaknesses CWE-862
References

Tue, 14 Jan 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:02:29.155Z

Reserved: 2022-12-16T13:54:11.561Z

Link: CVE-2022-4555

cve-icon Vulnrichment

Updated: 2024-08-03T01:41:45.521Z

cve-icon NVD

Status : Modified

Published: 2022-12-16T14:15:09.257

Modified: 2026-04-08T18:17:34.840

Link: CVE-2022-4555

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses