Input validation vulnerability in PoloPag – Pix Automático para Woocommerce 2.0.9

A plugin called PoloPag – Pix Automático para Woocommerce for the popular website platform WordPress has a security issue. This problem, known as Local File Inclusion, affects versions 2.0.9 and below. It allows people without proper authorization to access and run any type of file they want on the server. This means they can run code written in the programming language PHP, which can lead to serious consequences such as getting sensitive information or taking control of the website. This vulnerability can occur when seemingly harmless files like images are uploaded and included.

Detected in:

PoloPag – Pix Automático para eCommerce fixed vulnerable versions:
PoloPag – Pix Automático para Woocommerce open vulnerable versions: >= * <= 2.0.9

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.