Input validation vulnerability in WP Comment Remix 1.4.4

The WP Comment Remix plugin for WordPress had a security issue before version 1.4.4 that allowed people to use the ‘p’ parameter to run malicious code on the website. This could allow attackers to run any kind of commands that could harm the website.

Detected in:

WP Comment Remix open vulnerable versions: >= * < 1.4.4

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.