Input validation vulnerability in Process Steps Template Designer 1.2.1

The Process Steps Template Designer plugin for WordPress is vulnerable to malicious attacks through Cross-Site Request Forgery. This vulnerability affects versions up to 1.2.1 of the plugin. It is caused by incorrect or missing nonce validation on the save() function. This makes it possible for unauthenticated attackers to save field icons. They can do this by tricking a site administrator into clicking a link.

Detected in:

Process Steps Template Designer open vulnerable versions: >= * <= 1.2.1

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.