Input validation vulnerability in The Ultimate WordPress Toolkit – WP Extended 3.0.15

The WP Extended plugin for WordPress has a security issue that allows hackers to inject harmful code through SVG files. This can happen in all versions up to 3.0.15 because the plugin does not properly clean and protect the input and output. As a result, attackers with at least Author-level access can insert dangerous code into pages, which will activate when a user opens the SVG file.

Detected in:

The Ultimate WordPress Toolkit – WP Extended fixed vulnerable versions: >= * <= 3.0.15

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.