Input validation vulnerability in SiteOrigin Widgets Bundle 1.50.1

The SiteOrigin Widgets Bundle plugin for WordPress is vulnerable to a type of attack called Local File Inclusion. This attack affects all versions of the plugin up to and including 1.50.1. The attack allows anyone who has administrator-level access to the WordPress site to include and execute any file on the server. This includes any type of file, such as images or other “safe” file types, but also any type of PHP code which can be used to bypass access controls, obtain sensitive data, or even gain control of the server.

Detected in:

SiteOrigin Widgets Bundle fixed vulnerable versions: >= * <= 1.50.1

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.