Input validation vulnerability in Jupiter X Core 4.8.7

A plugin called Jupiter X Core for the popular website platform WordPress has a security issue that allows attackers to execute code remotely. This vulnerability affects all versions of the plugin up to version 4.8.7 and can be exploited by users with Contributor-level access or higher. This means that an attacker can upload a malicious file, such as an SVG image, and use it to run their own PHP code on the server. This can lead to unauthorized access, stealing sensitive information, or taking control of the website. Essentially, this vulnerability makes it easy for someone with limited access to gain control of the website.

Detected in:

Jupiter X Core fixed vulnerable versions: >= * <= 4.8.7

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.