Input validation vulnerability in Allow PHP Execute 1.0

The Allow PHP Execute plugin for WordPress has a security vulnerability that allows attackers to inject PHP code into posts and pages. This vulnerability affects all versions up to 1.0 and is caused by allowing all users to enter PHP code when unfiltered HTML is allowed. Attackers with Editor-level access or higher can take advantage of this vulnerability.

Detected in:

Allow PHP Execute open vulnerable versions: >= * <= 1.0

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.