Input validation vulnerability in Custom Post Type and Taxonomy GUI Manager 1.1

The Custom Post Type and Taxonomy GUI Manager for WordPress is not secure in versions up to and including 1.1. This means that people who are not authorized to do so can use a fake request to make the software do something it should not. This can be done by getting a website administrator to do something such as clicking on a link. The software does not properly filter out or protect user input

Detected in:

Custom Post Type and Taxonomy GUI Manager open vulnerable versions: >= * <= 1.1

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.