Input validation vulnerability in PopupAlly 2.1.1

The PopupAlly plugin for WordPress has a security issue where malicious code can be injected through the admin settings. This can happen in all versions up to 2.1.1 because the plugin does not properly clean the input and output. This means that someone with admin access can add harmful code to a page that will run whenever someone visits that page. This vulnerability only affects websites with multiple installations and those that have disabled unfiltered_html.

Detected in:

PopupAlly open vulnerable versions: >= * <= 2.1.1

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.