Input validation vulnerability in MJ Contact us 5.2.3

The MJ Contact us plugin for WordPress has a security vulnerability that allows for Reflected Cross-Site Scripting. This can occur in all versions up to 5.2.3, as the plugin does not properly clean up user input or escape output. This means that hackers who are not logged in can insert their own code into a page and potentially harm users if the user clicks on a harmful link.

Detected in:

MJ Contact us open vulnerable versions: >= * <= 5.2.3

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.