Input validation vulnerability in PGS Core 5.8.0

The PGS Core plugin for WordPress has a security issue that could allow attackers to inject malicious code. This vulnerability exists in all versions up to 5.8.0 and is caused by untrusted input being deserialized in the ‘import_header’ function. Attackers do not need to be logged in to exploit this vulnerability. It is important to note that there is no known way to chain this exploit with other plugins or themes, but if a chain is discovered, it could result in files being deleted, sensitive information being accessed, or code being executed.

Detected in:

PGS Core open vulnerable versions: >= * <= 5.8.0

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.