Input validation vulnerability in WPCasa 1.4.1

The WPCasa plugin, which is used with WordPress, has a security issue that allows hackers to inject their own code into the system. This can happen in all versions of the plugin, including the most recent one, 1.4.1. The problem is caused by not properly checking and limiting the ‘api_requests’ function, allowing attackers to run their own commands and code without needing to log in.

Detected in:

WPCasa fixed vulnerable versions: >= * <= 1.4.1

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.