Input validation vulnerability in WP REST API (WP API) 1.2.2

The WordPress REST API plugin is vulnerable to malicious attacks in versions up to and including 1.2.2. This means that anyone can inject dangerous web scripts into the plugin, which would then be executed in the browser of the person visiting the website. To protect against this, special measures should be taken to ensure that the input is properly sanitized and output is correctly escaped.

Detected in:

WP REST API (WP API) open vulnerable versions: >= * <= 1.2.2

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.