Input validation vulnerability in Twispay Credit Card Payments 2.1.2

The Twispay Credit Card Payments plugin for WordPress has a security issue in versions up to and including 2.1.2. This is because it does not properly remove harmful code from user input and output. This means that attackers who are not logged in can add harmful scripts to pages, which will run if a user is tricked into clicking on a link.

Detected in:

Twispay Credit Card Payments open vulnerable versions: >= * <= 2.1.2

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.