Input validation vulnerability in Post Pay Counter 2.789

The Post Pay Counter plugin for WordPress can be hacked by attackers if they can get a user to click on a malicious link. This is possible because the plugin fails to properly sanitize certain inputs and escape outputs when up to version 2.789. If the plugin is left unpatched, attackers can inject arbitrary scripts which will be executed on the user’s page.

Detected in:

Post Pay Counter fixed vulnerable versions: >= * <= 2.789

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.