The Injection Guard WordPress plugin before 1.2.8 does not escape the $_SERVER['REQUEST_URI'] parameter before outputting it back in an attribute, which could lead to Reflected Cross-Site Scripting in old web browsers
- https://wpscan.com/vulnerability/14a53525-8c08-472d-bae4-b3f14368b802/
- https://github.com/fkie-cad/nvd-json-data-feeds