Access violation vulnerability in One Click Close Comments 2.7.1

The One Click Close Comments plugin for WordPress has a security issue that affects all versions up to 2.7.1. This is because the plugin uses bootstrap and has test files with display_errors turned on. This means that people who are not logged in can find out the full path of the website. This information is not helpful by itself, but it can be used to make other attacks easier. It is important to have another vulnerability for this to cause harm to a website.

Detected in:

One Click Close Comments fixed vulnerable versions: >= * <= 2.7.1

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.