Input validation vulnerability in Guest Author 2.3

The Guest Author plugin for WordPress has a security vulnerability which allows attackers with author-level access or higher to inject malicious code into pages. This code will be executed any time someone visits the page. The vulnerability exists in all versions up to version 2.3 and is caused by the plugin not properly filtering input and output.

Detected in:

Guest Author fixed vulnerable versions: >= * <= 2.3

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.