Input validation vulnerability in acobot 2.0

An attacker could exploit multiple security weaknesses in the Acobot Live Chat & Contact Form plugin 2.0 for WordPress to gain access to an administrator’s account. This could be done to change the plugin settings or to carry out attacks that embed malicious code on the website. These attacks can be done by manipulating the acobot_token parameter in a page of the plugin that is located in the WordPress admin section.

Detected in:

acobot open vulnerable versions: >= * <= 2.0

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.