Input validation vulnerability in Grand Conference | Event WordPress 5.2

The Grand Conference plugin for WordPress has a security issue that allows hackers to inject a PHP Object. This can happen if they use untrusted information to deserialize the plugin. It is possible for someone to do this without having to log in. There is no known way for them to do this through the plugin itself. However, if the target system has other plugins or themes installed that have a POP chain, it could give the hacker access to delete files, gather private information, or run their own code on the website.

Detected in:

Grand Conference | Event WordPress fixed vulnerable versions: >= * <= 5.2

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.