WP To Do

This information is sourced from wpvulnerabilities.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Vulnerabilities

  • Input validation vulnerability in WP To Do 1.3.0

    Fixed

    The WP To Do plugin for WordPress has a security issue that allows hackers to inject harmful scripts into certain pages. This can only happen on a specific type of WordPress installation and can only...

    Read More
  • Input validation vulnerability in WP To Do 1.3.0

    Fixed

    The WP To Do plugin used for WordPress has a security issue in versions 1.3.0 and below. This is because it does not properly protect against harmful code being entered and displayed on web pages. Th...

    Read More
  • Input validation vulnerability in WP To Do 1.3.0

    Fixed

    The WP To Do plugin for WordPress has a security vulnerability that affects all versions up to and including 1.3.0. This vulnerability allows attackers to add comments to to-do items without being au...

    Read More
  • Input validation vulnerability in WP To Do 1.3.0

    Fixed

    The WP To Do plugin for WordPress is at risk of being hacked through Cross-Site Request Forgery, in versions 1.3.0 and below. This is because the wptodo_manage() function is missing proper security c...

    Read More
  • Input validation vulnerability in WP To Do 1.3.0

    Fixed

    A popular plugin called WP To Do for WordPress has a security issue that allows attackers to manipulate its settings without proper authorization. This vulnerability affects all versions, including t...

    Read More
  • Input validation vulnerability in WP To Do 1.3.0

    Fixed

    The WP To Do plugin used for WordPress has a security issue that allows hackers to insert harmful code into the website. This can only happen if the hacker already has administrative access and the "...

    Read More
  • Input validation vulnerability in WP To Do 1.2.8

    Fixed

    The WP To Do plugin for WordPress has a security issue called Stored Cross-Site Scripting. This means that attackers who are logged in and have certain levels of access can add harmful scripts to pag...

    Read More