Input validation vulnerability in Sliding Door 3.4

Several add-ons and designs for WordPress are at risk of Cross-Site Request Forgery in different versions. This is because the dismiss() function does not properly check for a security code. As a result, attackers without authorization can get rid of notifications by tricking a website administrator into taking an action, like clicking a link.

Detected in:

CityLogic fixed vulnerable versions: >= * < 1.1.30
Default Mag fixed vulnerable versions: >= * < 1.3.6
Emmet Lite fixed vulnerable versions: >= * < 1.7.8
Lightning fixed vulnerable versions: >= * <= 15.18.0
Namaha fixed vulnerable versions: >= * < 1.0.41
Panoramic fixed vulnerable versions: >= * < 1.1.57
Shopstar! fixed vulnerable versions: >= * < 1.1.34
Sliding Door fixed vulnerable versions: >= * < 3.4
X-T9 fixed vulnerable versions: >= * < 1.19.1
Decode open vulnerable versions: >= * <= 3.15.3
Gridsby open vulnerable versions: >= * <= 1.3.0
HappenStance open vulnerable versions: >= * <= 3.0.1
i-excel open vulnerable versions: >= * <= 1.7.9
i-max open vulnerable versions: >= * <= 1.6.2
Sensible WP open vulnerable versions: >= * <= 1.3.1

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.