Input validation vulnerability in Simple Tableau Viz 2.0

The Simple Tableau Viz plugin for WordPress has a security issue where malicious code can be injected through the ‘tableau’ shortcode. This problem exists in all versions up to 2.0 and is caused by not properly filtering user input and output. This means that attackers with contributor-level access or higher can insert harmful code into pages that will run when someone visits the page.

Detected in:

Simple Tableau Viz open vulnerable versions: >= * <= 2.0

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.