Input validation vulnerability in SEO Plugin by Squirrly SEO 12.3.19

There is a vulnerability in the SEO Plugin by Squirrly for WordPress that allows attackers to insert harmful code into web pages. This can be done by exploiting the ‘url’ parameter in versions up to 12.3.19. This vulnerability occurs because the plugin does not properly filter and protect user input. As a result, authenticated attackers with Contributor-level or higher access can inject malicious scripts into pages, which will run whenever a user visits the compromised page.

Detected in:

SEO Plugin by Squirrly SEO fixed vulnerable versions: >= * <= 12.3.19

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.