Input validation vulnerability in Be POPIA Compliant 1.2.0

The Be POPIA Compliant plugin for WordPress is not secure enough to protect against malicious attacks. An unknown parameter in versions up to and including 1.2.0 has a vulnerability that makes it possible for unauthenticated attackers to access sensitive information stored in the database. The vulnerability exists because the user supplied parameter is not properly escaped and there is not enough protection against existing SQL queries.

Detected in:

Be POPIA Compliant open vulnerable versions: >= * <= 1.2.0

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.