Input validation vulnerability in Email Before Download 3.6

The Email Before Download plugin for WordPress may be vulnerable to malicious attacks if it is not updated to the most recent version. In versions up to 3.6, attackers may be able to add newline characters to the ’emailfrom’ variable in the SMTP ‘From:’ header, which could lead to arbitrary headers and message bodies being created. To protect against this, it is important to keep the plugin up-to-date.

Detected in:

Email Before Download fixed vulnerable versions: >= * <= 3.6

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.