Input validation vulnerability in Zenon Lite 1.9

The Zenon Lite theme for WordPress has a security issue known as Stored Cross-Site Scripting. This means that the theme’s Button feature can be exploited if someone adds a specific ‘url’ parameter. This vulnerability exists in all versions of the theme up to version 1.9. The problem is caused by not properly cleaning up the input and output of the code. This allows attackers with Contributor-level or higher access to add harmful web scripts to pages, which will run whenever someone visits that page.

Detected in:

Zenon Lite open vulnerable versions: >= * <= 1.9

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.