Input validation vulnerability in Coupon Tab for DirectoryPress (pp-coupon-tab) 0.2.0

The Coupon Tab for DirectoryPress plugin for WordPress is vulnerable to a type of attack called Reflected Cross-Site Scripting. This vulnerability exists in versions up to and including 0.2.0. It allows an unauthenticated attacker to inject malicious code into webpages, which can execute if a user clicks on a link or performs another action. To do this, the attacker must be able to exploit certain parameters in the plugin, such as cfh, cc, cb, cd, ce, cdt, cdet, cs, cfw, and surl. This vulnerability could have been avoided by properly sanitizing the input and escaping the output.

Detected in:

Coupon Tab for DirectoryPress (pp-coupon-tab) open vulnerable versions: >= * <= 0.2.0

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.