Input validation vulnerability in WP RSS By Publishers 0.1

The WP RSS By Publishers plugin for WordPress has a security issue. It can be used by attackers to access sensitive information from the database. This affects all versions of the plugin up to 0.1. The problem is caused by not properly preparing the SQL query and not escaping user supplied parameters.

Detected in:

WP RSS By Publishers open vulnerable versions: >= * <= 0.1

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.