Input validation vulnerability in Envo Extra 1.8.16

The Envo Extra plugin for WordPress has a security issue that allows attackers to inject harmful code into web pages. This can happen because the plugin does not properly clean up the input and output of certain information. As a result, attackers with certain permissions can add their own code to pages, which will run whenever someone visits that page.

Detected in:

Envo Extra fixed vulnerable versions: >= * <= 1.8.16

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.