Output validation vulnerability in Event Registration 6.02.02

The Event Registration plugin for WordPress is not secure. It can be exploited in versions up to and including 6.02.02. Attackers can use an input from either the ‘reg_form’ or ‘questions’ parameter to inject a malicious object into the plugin. This could allow them to delete files, access sensitive information, or even run code. Even if a “POP chain” is present with another plugin or theme installed, this could still be done.

Detected in:

Event Registration open vulnerable versions: >= * <= 6.02.02

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.