Input validation vulnerability in WP To Do 1.3.0

A popular plugin called WP To Do for WordPress has a security issue that allows attackers to manipulate its settings without proper authorization. This vulnerability affects all versions, including the latest one, 1.3.0. It occurs because the plugin does not properly check for verification codes when using the wptodo_settings() function. This means that anyone who can trick a website manager into clicking a certain link can change the plugin’s settings without being authorized.

Detected in:

WP To Do open vulnerable versions: >= * <= 1.3.0

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.