Input validation vulnerability in MyParcel 4.24.1

The MyParcel plugin for WordPress has a security issue called Reflected Cross-Site Scripting. This happens because the plugin uses a specific type of URL without proper protection. This vulnerability exists in all versions of the plugin up to version 4.24.1. If exploited, it allows hackers to insert harmful web scripts into pages and activate them by tricking users into clicking on a link. It’s important to note that this vulnerability can only be taken advantage of if the WooCommerce store is set to Belgium.

Detected in:

MyParcel fixed vulnerable versions: >= * <= 4.24.1

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.