Input validation vulnerability in Hitsteps Web Analytics 5.85

The Hitsteps Web Analytics plugin for WordPress is vulnerable to a security issue that could allow malicious people to inject unwanted code into pages viewed by other users. This issue only affects WordPress sites that have been set up with multiple sites or have disabled a certain setting, “unfiltered_html”. This vulnerability affects all versions of the plugin up to and including 5.85, because of a lack of proper input sanitization and output escaping. To protect against this, administrators of affected sites should upgrade the plugin to the latest version and ensure that unfiltered_html is enabled.

Detected in:

Hitsteps Web Analytics fixed vulnerable versions: >= * <= 5.86

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.