Input validation vulnerability in rng-refresh 1.0

The plugin called “rng-refresh” for WordPress has a security vulnerability in all versions up to 1.0. This is because it does not properly clean up the input and output. This means that people who are not logged in could add harmful scripts to a webpage and trick users into clicking on them.

Detected in:

rng-refresh open vulnerable versions: >= * <= 1.0

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.