Input validation vulnerability in Quick Post Duplicator 2.0

The Quick Post Duplicator for WordPress is vulnerable to a type of cyber attack called SQL Injection. This vulnerability exists in all versions of the plugin up to version 2.0. Any user who has contributor-level privileges on the WordPress website can use the vulnerability to extract sensitive information from the database. This is possible because the plugin does not escape user supplied parameters correctly and does not safeguard existing SQL queries.

Detected in:

Quick Post Duplicator open vulnerable versions: >= * <= 2.0

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.