Input validation vulnerability in Hacklog Remote Attachment 1.3.2

The Hacklog Remote Attachment plugin for WordPress has a security issue where it is vulnerable to Cross-Site Request Forgery. This means that anyone can access and perform actions on the plugin without proper authorization. This vulnerability exists in all versions up to version 1.3.2. This can happen if someone tricks a site administrator into clicking on a link.

Detected in:

Hacklog Remote Attachment open vulnerable versions: >= * <= 1.3.2

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.