Input validation vulnerability in 4 plugins by miniorange

Multiple miniorange Plugins for WordPress have a security vulnerability which can allow unauthenticated attackers to inject malicious code into webpages. This happens when the ‘appId’ parameter is not protected properly, meaning it does not have enough input sanitation or output escaping. If a user clicks on a link that has been maliciously crafted, the code will be executed.

Detected in:

Login with Azure (Azure SSO) fixed vulnerable versions: >= * <= 1.4.4
Login with Cognito fixed vulnerable versions: >= * <= 1.4.3
OAuth Single Sign On – SSO (OAuth Client) fixed vulnerable versions: >= * <= 6.20.2
WordPress OpenID Connect Client open vulnerable versions: >= * <= 2.1.4

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.