Input validation vulnerability in Constant Contact for WordPress 4.1.1

The Constant Contact for WordPress plugin, which is used on WordPress websites, has a security vulnerability. This means that malicious code can be injected by unauthorized users through the plugin. However, this vulnerability will only have an impact if there is another plugin or theme installed on the website that contains a specific type of code called a POP chain. If this type of code is present, it could allow the attacker to do things like delete important files, access sensitive information, or run harmful code on the website.

Detected in:

Constant Contact for WordPress open vulnerable versions: >= * <= 4.1.1

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.