Input validation vulnerability in Reset 1.6

The Reset plugin for WordPress is not secure and can be easily manipulated by hackers. This vulnerability, found in all versions up to 1.6, is caused by a missing security check when using the reset_db_page() function. This means that attackers who are not logged into the website can reset various tables in the database, including comments, themes, and plugins, by tricking the site administrator into clicking on a link.

Detected in:

Reset fixed vulnerable versions: >= * <= 1.6

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.