Input validation vulnerability in TPG Get Posts 3.6.5

The TPG Get Posts plugin for WordPress has a security issue where a type of malicious code called “Stored Cross-Site Scripting” can be injected through the plugin’s ‘tpg_get_posts’ feature. This can happen in any version of the plugin up to version 3.6.5, as the plugin does not properly protect against harmful input and output from users. This means that attackers who are logged in with certain levels of access can potentially add harmful code to pages that will run whenever someone views that page.

Detected in:

TPG Get Posts open vulnerable versions: >= * <= 3.6.5

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.