Input validation vulnerability in WP Site Protector 2.0

The WP Site Protector plugin for WordPress, up to version 2.0, is not secure against malicious attacks. This means that, if a malicious user can convince an administrator to click a link, they can exploit a vulnerability in the plugin that allows them to change the plugin’s settings without authenticating. This is because the plugin does not have certain security measures in place to prevent such attacks.

Detected in:

WP Site Protector open vulnerable versions: >= * <= 2.0

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.