Input validation vulnerability in 11 plugins by Inisev

Several plugins for WordPress created by Inisev have a security vulnerability which can allow unauthorised installation of plugins. This is due to the lack of a security check on the handle_installation function, which is called when using the inisev_installation AJAX action. This means that if an unauthenticated attacker can successfully trick a site administrator into clicking a link, they could potentially install plugins from a limited list via a fake request.

Detected in:

Backup Migration fixed vulnerable versions: >= * <= 1.2.7
Backup Migration Staging fixed vulnerable versions:
BackupBliss – Backup Migration Staging fixed vulnerable versions:
Clone fixed vulnerable versions: >= * <= 2.3.7
Enhanced Text Widget fixed vulnerable versions: >= * <= 1.5.7
Pop-Up Chop Chop fixed vulnerable versions:
Redirection fixed vulnerable versions:
RSS Redirect & Feedburner Alternative fixed vulnerable versions: >= * <= 3.7
Social Media Share Buttons & Social Sharing Icons fixed vulnerable versions: >= * <= 2.8.1
SSL Mixed Content Fix fixed vulnerable versions: >= * <= 3.2.3
Ultimate Posts Widget fixed vulnerable versions: >= * <= 2.2.4
Yoast Duplicate Post fixed vulnerable versions:
Social Share Icons & Social Share Buttons open vulnerable versions: >= * <= 3.5.7

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.