Input validation vulnerability in Owl carousel responsive 1.9

The Owl carousel plugin used in WordPress can be easily hacked through a method called time-based SQL Injection. This is because the plugin does not have enough security measures in place to protect user input, specifically in the ‘id’ parameter. This vulnerability exists in all versions up to and including 1.9. This means that people with Contributor-level access or higher can add their own malicious code to the existing code and potentially access private information from the website’s database.

Detected in:

Owl carousel responsive open vulnerable versions: >= * <= 1.9

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.