Input validation vulnerability in redy 1.0.2

A popular WordPress theme called “Redy” has a security issue called “Local File Inclusion” which affects versions up to 1.0.2. This means that attackers who are not logged in can access and run any files they want on the server. This can lead to bypassing security measures, getting confidential information, or executing harmful code. This can even happen with seemingly harmless files like images.

Detected in:

redy open vulnerable versions: >= * <= 1.0.2

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.