Input validation vulnerability in Image Tag Manager 1.5

The Image Tag Manager plugin for WordPress is not safe because it can be attacked by hackers through a certain parameter called ‘default_class’. This can happen because the plugin does not properly clean up the input and output, making it easy for hackers to insert harmful scripts into the pages. This can only happen if the user is tricked into clicking on a link.

Detected in:

Image Tag Manager open vulnerable versions: >= * <= 1.5

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.