Input validation vulnerability in Contact Form and Calls To Action by vcita 2.6.4

The [vcita] plugin for WordPress websites is vulnerable to an attack called Stored Cross-Site Scripting. This type of attack can allow someone with a certain level of access to the website, such as a contributor or higher, to inject malicious code into web pages. This code will execute anytime a user visits the affected page. Versions of the [vcita] plugin up to and including 2.6.4 are vulnerable due to a lack of input validation and output escaping.

Detected in:

Contact Form and Calls To Action by vcita open vulnerable versions: >= * <= 2.6.4

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.