Input validation vulnerability in FooGallery Captions 1.0.2

The FooGallery Captions plugin for WordPress has a security issue that allows attackers to inject harmful code into web pages if a user clicks on a certain link. This can happen in all versions of the plugin, up to 1.0.2, because the plugin does not properly clean up the input and output. This means that anyone can do this, even if they are not logged in to WordPress.

Detected in:

FooGallery Captions open vulnerable versions: >= * <= 1.0.2

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.