Input validation vulnerability in Smarty for WordPress 3.1.35

The Smarty for WordPress plugin is vulnerable to a type of attack known as Stored Cross-Site Scripting. This type of attack is possible if you have an outdated version of the plugin, up to and including version 3.1.35. The vulnerability is caused by the plugin not properly sanitizing or escaping data input or output. This means that if an attacker with administrator-level access or above injects malicious code, it will be executed when someone views the page. This only applies to multi-site WordPress installations or installations where the unfiltered_html setting has been disabled.

Detected in:

Smarty for WordPress open vulnerable versions: >= * <= 3.1.35

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.