Input validation vulnerability in Author Chat 1.9.0

The Author Char plugin for WordPress is vulnerable to a type of attack called generic SQL Injection. This type of attack affects the versions of the plugin up to and including 1.9.0. This vulnerability occurs because the plugin does not properly escape the user supplied information and does not sufficiently prepare the SQL query. An unauthenticated attacker can use this vulnerability to add additional SQL queries to an already existing query. This can be used to access sensitive information from the database.

Detected in:

Author Chat fixed vulnerable versions: >= * <= 1.9.0

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.