Google Doc Embedder

Google Doc Embedder allows users to embed various file types into WordPress pages using the Google Docs Viewer, enabling inline viewing and downloading of popular file types without the need for Flash or PDF browser plug-ins. However, recent changes to Google's viewer may make other plugins more suitable. Supported file formats include Adobe Acrobat (PDF) and Microsoft Word (DOC/DOCX).

This information is sourced from wpvulnerabilities.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Vulnerabilities

  • Input validation vulnerability in Google Doc Embedder 2.6.4

    Open

    A plugin called Google Doc Embedder for WordPress has a security issue that can be used by certain users to make requests to other websites without authorization. This can potentially access and chan...

    Read More
  • Input validation vulnerability in Google Doc Embedder 2.5.19

    Fixed

    The Google Doc Embedder plugin before version 2.5.19 for WordPress had a security issue that allowed someone to put harmful code on a website. This code

    Read More
  • Input validation vulnerability in Google Doc Embedder 2.6.1

    Fixed

    The Google-Document-Embedder plugin for WordPress (a website building tool) had a security problem before version 2.6.1. The problem allowed people to do something called Cross-Site Scripting (XSS).

    Read More
  • Input validation vulnerability in Google Doc Embedder 2.6.2

    Fixed

    The Google-Document-Embedder plugin

    Read More
  • Access violation vulnerability in Google Doc Embedder 2.5.4

    Fixed

    The Google Doc Embedder plugin

    Read More
  • Input validation vulnerability in Google Doc Embedder 2.5.17

    Fixed

    The Google Doc Embedder plugin

    Read More
  • Input validation vulnerability in Google Doc Embedder 2.6.1

    Fixed

    The Google Doc Embedder plugin for WordPress has a security flaw that affects versions up to 2.6.1. This means that people who are not authorized to do so could use a false request to perform maliciou...

    Read More