Input validation vulnerability in Spryng Payments for WooCommerce 1.6.7

The Spryng Payments for WooCommerce plugin for WordPress has a security vulnerability that could allow an unauthenticated attacker to inject malicious web scripts into pages on the website. This vulnerability exists in versions of the plugin up to and including 1.6.7, and is due to improper input sanitization and output escaping. This means that if an attacker can convince a user to click on a link, the malicious web scripts could be executed.

Detected in:

Spryng Payments for WooCommerce open vulnerable versions: >= * <= 1.6.7

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.