Input validation vulnerability in RapidResult 1.2

The RapidResult plugin for WordPress has a security issue that allows hackers to inject SQL commands using the ‘s’ parameter. This problem exists in all versions up to and including 1.2. It is caused by not properly accounting for user input and not properly preparing the SQL query. This means that someone with contributor-level permissions or higher can add their own SQL commands to existing ones and potentially access confidential information from the database.

Detected in:

RapidResult open vulnerable versions: >= * <= 1.2

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.