Input validation vulnerability in filedownload 1.4

The WordPress filedownload plugin is not secure in versions before 1.4. An attacker can use it to get sensitive information from the database by adding extra code to the user-supplied parameter. This extra code can be used to ask questions of the database and get answers back.

Detected in:

filedownload open vulnerable versions: >= * < 1.4

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.