Input validation vulnerability in Travel Light 1.0

The Travel Light plugin for WordPress is vulnerable to Cross-Site Request Forgery (CSRF) in versions up to 1.0. This means that it is possible for attackers who are not logged in to gain restricted access to administrative actions by tricking a site administrator into clicking on a link or performing another action. This is because the plugin does not have the correct measures in place to validate requests on the ‘booktrip’, ‘filter_plcbrd_action’, ‘filter_plcservice_action’, ‘filter_action’ and ‘filter_service_action’ AJAX actions.

Detected in:

Travel Light open vulnerable versions: >= * <= 1.0

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.