Testimonial

This information is sourced from wpvulnerabilities.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Vulnerabilities

  • Input validation vulnerability in Testimonial 2.3

    Fixed

    The Testimonial plugin for WordPress has a security vulnerability that allows attackers to access sensitive information from the database. This can happen if the attacker has Contributor-level access...

    Read More
  • Input validation vulnerability in Testimonial 2.3

    Fixed

    The Testimonial plugin for WordPress is vulnerable to security issues in versions up to 2.2. This means that attackers who can get an administrator to click on a link may be able to perform Cross-Sit...

    Read More
  • Input validation vulnerability in Testimonial 2.3

    Fixed

    Someone with bad intentions may be able to use a security vulnerability in the IndiaNIC Testimonial plugin 2.2 for WordPress to run commands on the website. The vulnerability exists in a file called t...

    Read More
  • Input validation vulnerability in Testimonial 2.3

    Fixed

    Hackers can use vulnerabilities in the IndiaNIC Testimonial plugin 2.2 for WordPress to gain control of an administrator's account. This could be done by sending a request to a certain website that wo...

    Read More
  • Input validation vulnerability in Testimonial 1.6.0

    Fixed

    The Testimonial WordPress plugin released before version 1.6.0 did not properly protect against malicious code in some areas. This could allow people with special privileges to add code that could mak...

    Read More
  • Input validation vulnerability in Testimonial 1.6.1

    Fixed

    The Testimonial Builder plugin for WordPress has a security flaw which affects versions 1.6.1 and below. If an attacker has a subscriber-level permission or higher

    Read More