Input validation vulnerability in LogDash Activity Log 1.1.3

The LogDash Activity Log plugin for WordPress has a security issue that allows attackers to access sensitive information from the database. This vulnerability is caused by a lack of protection on the username parameter and inadequate preparation on the SQL query. It affects all versions of the plugin up to 1.1.3 and can be exploited by unauthorized individuals.

Detected in:

LogDash Activity Log fixed vulnerable versions: >= * <= 1.1.3

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.