Input validation vulnerability in Enable Media Replace 4.1.4

The Enable Media Replace plugin for WordPress contains a security vulnerability that could allow unauthenticated attackers to inject malicious scripts in pages that are visible to users. In order for an attacker to exploit this vulnerability, they must know the ID of a file or attachment uploaded by the user they are targeting. This vulnerability exists in all versions of the plugin up to and including version 4.1.4, and is due to the plugin not properly sanitizing input data or escaping output data.

Detected in:

Enable Media Replace fixed vulnerable versions: >= * <= 4.1.4

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.