Input validation vulnerability in WP Login Control 2.0.0

The WP Login Control plugin for WordPress has a security issue where an attacker can inject harmful scripts into the website through a parameter called ‘order’. This can happen because the plugin does not properly clean and protect the input and output. This vulnerability can be exploited by someone who is not logged in to the website, by tricking a user into clicking on a link that executes the script.

Detected in:

WP Login Control open vulnerable versions: >= * <= 2.0.0

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.