Input validation vulnerability in Clock In Portal- Staff & Attendance Management 2.1

The Clock In Portal plugin for WordPress is vulnerable to a type of attack called “Cross-Site Request Forgery”. This issue affects versions of the plugin up to and including version 2.1. The vulnerability is caused by incorrect or missing validation of a special security code (called a “nonce”) when a user tries to delete a staff member. This means that if an unauthenticated attacker can get a site administrator to click a link they provide, it is possible for them to delete staff members with a forged request.

Detected in:

Clock In Portal- Staff & Attendance Management fixed vulnerable versions: > 0 < 0

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.