Input validation vulnerability in Post Status Notifier 1.11.6

The Post Status Notifier Lite and Premium plugins for WordPress have a security vulnerability that allows for a type of attack called Reflected Cross-Site Scripting. This occurs through the ‘page’ parameter in all versions up to 1.11.6 because the input is not properly checked and the output is not properly protected. This means that someone without a username or password can insert harmful web scripts into pages if they can trick a user into clicking on a link.

Detected in:

Post Status Notifier fixed vulnerable versions: >= * <= 1.11.6
Post Status Notifier Lite fixed vulnerable versions: >= * <= 1.11.6

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.