Input validation vulnerability in RLSWordPressSearch *

The RLSWordPressSearch plugin for WordPress has a security vulnerability that could allow unauthenticated attackers to access sensitive information from the database. This vulnerability occurs when the ‘agentid’ parameter in the ‘register.php’ file is not properly escaped or prepared for an existing SQL query, allowing attackers to add additional SQL queries to the existing query.

Detected in:

RLSWordPressSearch fixed vulnerable versions: >= * <= *

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.