Input validation vulnerability in Simple File List 6.1.9

The Simple File List plugin for WordPress is vulnerable to a type of cyber attack called Stored Cross-Site Scripting. This attack can be performed on versions up to, and including, 6.1.9. This type of attack is possible because the plugin does not properly filter and protect the data that is inputted into it. An attacker with administrator-level access would be able to insert malicious web scripts into pages, which would then execute automatically when a user visits that page. This vulnerability is only present on multi-site installations and installations where an additional security feature called unfiltered_html has been disabled.

Detected in:

Simple File List fixed vulnerable versions: >= * <= 6.1.9

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.