Input validation vulnerability in PHPRelativePath library (3 plugins affected)

Several plugins for WordPress have a vulnerability that allows unauthenticated attackers to inject malicious web scripts in pages. This is due to the ‘path’ parameter included in the PHPRelativePath Library not being properly protected against input and output. If an attacker can trick a user into clicking a link, the scripts will execute.

Detected in:

MPL-Publisher — Ebook & Audiobook Creator fixed vulnerable versions: >= * <= 1.29.1
Read Offline open vulnerable versions: >= * <= 0.9.17
WooCommerce PDF Invoice Bulk Download open vulnerable versions: >= * <= 1.0.0

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.