Input validation vulnerability in Mapwiz 1.0.1

The Mapwiz plugin for WordPress has a security issue in versions up to and including 1.0.1. Attackers with administrative privileges can exploit this issue to gain access to sensitive information stored in the database. This is possible because the “”mid”” parameter is not properly escaped and the existing SQL query is not properly prepared.

Detected in:

Mapwiz open vulnerable versions: >= * <= 1.0.1

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.