Input validation vulnerability in Visual Website Collaboration, Feedback & Project Management – Atarim 3.9.3

The Atarim plugin for WordPress is not secure against malicious attacks. In versions up to and including 3.9.3 of the plugin, attackers can inject harmful code into web pages if they can manage to get a user to click on a link. This is done by exploiting a vulnerability in the way the plugin handles the ‘wpf_graphics_excerpt’ parameter, which is not properly sanitized or protected. This code can then be executed, potentially damaging the user’s device.

Detected in:

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.