Input validation vulnerability in Shipdeo 1.2.8

The Shipdeo plugin used in WordPress has a security issue called Reflected Cross-Site Scripting. This happens in all versions, including 1.2.8, because the input is not properly cleaned and the output is not properly protected. This means that someone who is not logged in can insert harmful code into a page by tricking a user into clicking on a link.

Detected in:

Shipdeo open vulnerable versions: >= * <= 1.2.8

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.