Input validation vulnerability in Partners 0.2.0

The Partners plugin used in WordPress has a vulnerability that allows hackers to inject harmful code through untrusted input. This can be done by anyone without needing to log in. If the target system has an additional plugin or theme that contains a POP chain, the attacker could potentially delete files, access private information, or run their own code.

Detected in:

Partners open vulnerable versions: >= * <= 0.2.0

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.