Skip to content
Pricing
Knowledge base
Support
Pricing
Knowledge base
Support
> Get Pro <
Pricing
Knowledge base
Support
Account area
> Get Pro <
Pricing
Knowledge base
Support
Account area
Login
Log out
Get PRO
Home » Vulnerabilities » Access violation vulnerability in Freemius SDK (620 components affected)
Latest
Passkeys: no need for Limit Login Attempts?
Configuring Really Simple Security with WP-CLI
How to Fix The “Link you followed has Expired” error on WordPress
404 not found errors
Protecting site visitors with Security Headers
Hardening your website’s security
Access violation vulnerability in Freemius SDK (620 components affected)
Freemius, a software development kit used by hundreds of WordPress plugin and theme developers, had a security vulnerability in its older versions (up to and including 2.4.2). This vulnerability could have allowed malicious actors to access confidential information or perform Cross-Site Request Forgery (CSRF). To prevent this, WordPress plugin and theme developers should upgrade to a version of Freemius greater than 2.4.2.
Detected in:
This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!
Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:
> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21
Is this information incorrect? Please leave us a message.