Input validation vulnerability in Tracking Code Manager 2.2.0

The Tracking Code Manager plugin for WordPress has a security issue that allows hackers to inject harmful code into the website’s admin settings. This can happen in all versions up to 2.2.0 because the plugin does not properly clean and protect user input. This means that someone with administrator-level access can add their own code to a page, and it will run whenever someone visits that page. This only affects websites with multiple sites or with certain security settings disabled.

Detected in:

Tracking Code Manager fixed vulnerable versions: >= * <= 2.2.0

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.