Input validation vulnerability in Duplicate Page, Post, WP Post Page Clone and Duplicate Page plugins

The Duplicate Page, Post, WP Post Page Clone and Duplicate Page plugins for WordPress are vulnerable to a type of attack called SQL Injection. This security vulnerability can be exploited by attackers to extract sensitive information from the database. This is possible because the plugins do not properly protect user-supplied data from malicious input, and do not properly prepare existing SQL queries. The vulnerability affects all versions of the plugins up to and including 2.5.6, 1.1, and 3.3 respectively.

Detected in:

Duplicate Page fixed vulnerable versions: >= * < 3.4
WP Post Page Clone fixed vulnerable versions: >= * < 1.2
Duplicate Page and Post open vulnerable versions:

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.