Input validation vulnerability in Realbig For WordPress 1.0.2

The Realbig plugin for WordPress is vulnerable to an attack called Cross-Site Request Forgery in versions up to 1.0.2. This means that an unauthenticated attacker can modify the plugin settings, clear logs and cache if they can manage to get an administrator to perform an action such as clicking on a link. This is possible because the plugin does not validate the nonce for the tokenSync() function.

Detected in:

Realbig For WordPress fixed vulnerable versions: >= * <= 1.0.6

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.