Access violation vulnerability in HyperComments 1.2.2

The HyperComments plugin for WordPress can be vulnerable to unauthenticated attackers deleting files on the vulnerable filesystem if it is in versions up to and including 1.2.2. This vulnerability is caused by the “xml” GET parameter.

Detected in:

HyperComments open vulnerable versions: >= * <= 1.2.2

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.