Input validation vulnerability in Parsi Date 4.0.1

The Parsi Date plugin for WordPress, which is used on websites up to version 4.0.1, is vulnerable to malicious code attacks. This means that if someone is able to trick a user into clicking a link, they can insert malicious code into the website. This malicious code can then be used to cause damage or gain access to the website. To prevent this, input sanitization and output escaping on urls must be improved.

Detected in:

Parsi Date fixed vulnerable versions: >= * <= 4.0.1
پارسی دیت – Parsi Date fixed vulnerable versions:

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.