Input validation vulnerability in Checkout Mestres WP 7.1.9.6

The Checkout Mestres WP plugin for WordPress is vulnerable to a type of attack called SQL Injection. This type of attack allows unauthenticated attackers to gain access to sensitive information from the database. All versions of the Checkout Mestres WP plugin up to and including 7.1.9.6 are vulnerable because the user-supplied parameter wasn’t escaped properly and the existing SQL query wasn’t prepared properly.

Detected in:

Checkout Mestres do WP for WooCommerce fixed vulnerable versions:
Checkout Mestres WP open vulnerable versions: >= * <= 7.1.9.6

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.