Input validation vulnerability in ajax-extend 1.0

The plugin called “ajax-extend” for WordPress has a security issue in all versions up to 1.0. This means that anyone can remotely execute code on the server without being verified. This is because the plugin does not properly control the user input before using a function called “call_user_func()”.

Detected in:

ajax-extend open vulnerable versions: >= * <= 1.0

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.