Input validation vulnerability in Trust Payments Gateway for WooCommerce (JavaScript Library) 1.2.2

The Trust Payments Gateway (3DS2) plugin for WordPress is vulnerable to a security risk called Cross-Site Request Forgery in versions 1.2.2 and earlier. This means that it is possible for unauthenticated attackers to do certain administrative actions without permission by tricking an administrator into performing an action like clicking on a link. This is possible because there is not enough validation on functions like tpgw_create_new_user() and tpgw_update_address_myst().

Detected in:

Trust Payments Gateway for WooCommerce (JavaScript Library) fixed vulnerable versions: >= * <= 1.2.2

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.