Input validation vulnerability in Disqus Comment System 2.68

The Disqus Comment System plugin for WordPress is vulnerable to a type of attack called Reflected Cross-Site Scripting. This means that, in versions before 2.68, if you can trick a user into clicking on a link, malicious code can be injected into the page. This is because the plugin does not properly check and filter the inputs it receives, nor does it properly protect the output it sends.

Detected in:

Disqus Comment System fixed vulnerable versions: >= * < 2.68

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.