Input validation vulnerability in Double Opt-In for Download 2.1.0

The Double Opt-In for Download Plugin for WordPress is vulnerable to a type of cyber attack called SQL Injection. This vulnerability affects versions of the plugin up to and including 2.0.9. Attackers with permission to access a subscriber-level account or higher can use the vulnerability to gain access to sensitive information from the database. This is caused by not properly escaping user supplied parameters and not adequately preparing existing SQL queries.

Detected in:

Double Opt-In for Download open vulnerable versions: >= * < 2.1.0

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.