Input validation vulnerability in Dima Take Action 1.0.5

The Dima Take Action plugin for WordPress has a security issue that could potentially harm your website. This vulnerability affects versions 1.0.5 and below, and it is caused by not properly filtering and escaping input. This means that hackers with administrator or higher access can insert harmful code into your pages, which will run whenever someone visits those pages. This only affects websites with multiple sites or if the “unfiltered_html” feature has been turned off.

Detected in:

Dima Take Action open vulnerable versions: >= * <= 1.0.5

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.