Input validation vulnerability in Extra User Details 0.5

The Extra User Details plugin for WordPress is vulnerable to malicious code being inserted into the website by an attacker with administrator-level permissions. This malicious code can be executed whenever a user visits the website, which can be used for malicious purposes. This is a problem for multi-site installations and installations where unfiltered_html has been disabled. This vulnerability affects all versions of the plugin up to and including 0.5, and is caused by the plugin not correctly sanitizing data and not properly escaping output.

Detected in:

Extra User Details fixed vulnerable versions: >= * <= 0.5

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.