Input validation vulnerability in Event Registration Calendar By vcita 1.3.1

The Event Registration Calendar by vcita plugin and the Online Payments – Get Paid with PayPal, Square & Stripe plugin for WordPress have a security issue. It is possible for someone who is not authorized to access the plugin’s settings and inject malicious JavaScript, with the help of an administrator. This can be done if the administrator can be tricked into performing certain actions like clicking a link. To prevent this, the plugins should be updated to include a nonce validation in the ls_parse_vcita_callback() function.

Detected in:

Online Payments – Get Paid with PayPal, Square & Stripe fixed vulnerable versions: >= * <= 3.10.0
Event Registration Calendar By vcita open vulnerable versions: >= * <= 1.3.1

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.