Access violation vulnerability in TNC Toolbox: Web Performance 1.4.2

A popular plugin used on WordPress, called the TNC Toolbox: Web Performance, has a security flaw that can expose sensitive information to hackers. This flaw exists in all versions up to and including 1.4.2. The plugin stores important credentials for cPanel API (hostname, username, and API key) in files located in the wp-content directory, which can be easily accessed by anyone. This means that unauthorized individuals can retrieve these credentials and use them to access the cPanel API, potentially causing serious harm to the hosting environment.

Detected in:

TNC Toolbox: Web Performance fixed vulnerable versions: >= * <= 1.4.2

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.