Access violation vulnerability in WC Plus 1.2.0

The WC Plus plugin for WordPress has a security issue that allows unauthorized changes to be made to data. This is because it does not have a check in place to verify the user’s capabilities when using the ‘pluswc_logo_favicon_logo_base’ feature. This vulnerability exists in all versions of the plugin up to and including 1.2.0. This means that attackers who are not logged in can change the site’s favicon logo base.

Detected in:

WC Plus open vulnerable versions: >= * <= 1.2.0

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.