Input validation vulnerability in Hot Linked Image Cacher 1.16

The Hot Linked Image Cacher plugin for WordPress has a security vulnerability that could allow attackers to inject malicious web scripts into pages. This would happen if a user clicks on a link that was crafted by the attacker. The vulnerability affects versions up to and including 1.16, and is caused by the plugin not properly sanitizing its inputs and escaping its outputs.

Detected in:

Hot Linked Image Cacher open vulnerable versions: >= * <= 1.16

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.