Input validation vulnerability in Name Directory 1.29.0

The Name Directory plugin used in WordPress has a security vulnerability called Reflected Cross-Site Scripting. This affects all versions up to 1.29.0. The issue is caused by not properly cleaning the user input and the output. This means that attackers who are not logged in can insert harmful web scripts into pages. They can do this by tricking a user into clicking on a link.

Detected in:

Name Directory fixed vulnerable versions: >= * <= 1.29.0

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.