Input validation vulnerability in Logo Carousel – Clients logo carousel for WP 1.2.0

The Logo Carousel is a plugin for WordPress that displays a carousel of client logos. Unfortunately, versions up to and including 1.2.0 are vulnerable to a type of cyber attack called Stored Cross-Site Scripting. This means that the plugin does not properly clean up user input and output, allowing attackers with certain levels of access to inject harmful code into web pages. This code will then run whenever a user visits the affected page.

Detected in:

Logo Carousel – Clients logo carousel for WP fixed vulnerable versions: >= * <= 1.2.0

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.