Input validation vulnerability in StreamWeasels Kick Integration 1.1.1

The plugin called “StreamWeasels Kick Integration” for WordPress has a security issue. This problem, known as Stored Cross-Site Scripting, can be exploited through the plugin’s “sw-kick-embed” feature. This vulnerability exists in all versions of the plugin up to version 1.1.1. The issue is caused by not properly filtering and protecting information entered by users. This means that someone with contributor-level access or higher can add harmful code to a page. When a user visits that page, the code will run and potentially cause damage.

Detected in:

StreamWeasels Kick Integration fixed vulnerable versions: >= * <= 1.1.1

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.