Input validation vulnerability in Image Editor by Pixo 2.3.8

The Pixo plugin for WordPress, called Image Editor, has a security flaw that could allow hackers to inject harmful code into web pages. This could happen on versions up to 2.3.8 of the plugin because it doesn’t properly clean up the input and output. This means that attackers with contributor-level access or higher could add their own code to a page, which would run whenever someone visits that page.

Detected in:

Image Editor by Pixo open vulnerable versions: >= * <= 2.3.8

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.