Input validation vulnerability in Capturly 2.0.1

The Capturly plugin for WordPress has a security issue called Local File Inclusion, which affects versions 2.0.1 and below. This vulnerability allows hackers to access and run any type of file on the server without needing to log in. This can be used to get around security measures, get private information, or run malicious code, even if the file is supposed to be safe.

Detected in:

Capturly open vulnerable versions: >= * <= 2.0.1

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.