Clone

This information is sourced from wpvulnerabilities.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Vulnerabilities

  • Input validation vulnerability in Clone 2.4.6

    Fixed

    The Clone plugin used in WordPress has a security issue where it can be manipulated by hackers to inject a malicious code. This can happen if the plugin receives an untrusted input in the 'recursive_...

    Read More
  • Access violation vulnerability in Clone 2.4.5

    Fixed

    The Clone plugin for WordPress is not secure and could potentially allow attackers to change data without permission. This is because the wpa_wpc_ajax_install_new() function does not have a check to ...

    Read More
  • Access violation vulnerability in Redirection 1.1.9

    Fixed

    Some plugins and themes created by Inisev for WordPress are at risk of being accessed without permission. This is because certain functions in different versions do not have proper checks to prevent ...

    Read More
  • Access violation vulnerability in Clone 2.4.2

    Fixed

    The Clone plugin for WordPress is a tool that website owners can use to make backup copies of their website. Unfortunately, a vulnerability has been found in all versions of the plugin that make it p...

    Read More
  • Input validation vulnerability in 11 plugins by Inisev

    Fixed

    Several plugins for WordPress created by Inisev have a security vulnerability which can allow unauthorised installation of plugins. This is due to the lack of a security check on the handle_installati...

    Read More
  • Access violation vulnerability in 11 plugins by Inisev

    Fixed

    Several plugins that are used on WordPress websites created by Inisev have a security vulnerability that can allow attackers with very limited permissions, such as subscribers, to install certain plug...

    Read More
  • Access violation vulnerability in Clone 2.3.7

    Fixed

    The Clone plugin for WordPress has a security issue that affects versions up to 2.3.7. If someone with subscriber-level access or higher uses this plugin

    Read More
  • Input validation vulnerability in Clone 2.3.7

    Fixed

    The Clone plugin for WordPress, used to create an exact copy of a WordPress website, is vulnerable to a security problem called Cross-Site Request Forgery. This means that versions of the plugin up t...

    Read More