Input validation vulnerability in WP To Do 1.3.0

The WP To Do plugin used for WordPress has a security issue that allows hackers to insert harmful code into the website. This can only happen if the hacker already has administrative access and the “unfiltered_html” feature is turned off. If these conditions are met, the attacker can inject their own code that will run when someone visits the affected page.

Detected in:

WP To Do open vulnerable versions: >= * <= 1.3.0

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.