Input validation vulnerability in WhitePage 1.1.5

The WhitePage plugin for WordPress is vulnerable to a type of attack called Cross-Site Request Forgery. This type of attack can happen when a website’s security is not configured correctly. In the case of the WhitePage plugin, this vulnerability exists in versions of the plugin up to and including 1.1.5. The security flaw is caused by an issue with the validation of a nonce, a type of security code, on a file called params_api_form.php. This means that unauthenticated attackers (people who are not logged in) can update the settings of the plugin if they can get an administrator of the website to perform an action, like clicking on a link.

Detected in:

WhitePage open vulnerable versions: >= * <= 1.1.5

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.