Input validation vulnerability in Download Monitor 1.6.5

The Download Monitor plugin for WordPress is vulnerable to a security issue called Cross-Site Scripting. This means that versions of the plugin up to and including 1.6.4 are at risk. This vulnerability is caused by the plugin not properly checking user input and not properly escaping output. This means that an attacker may be able to inject malicious code into the plugin, which could be used to execute malicious code in a victim’s web browser.

Detected in:

Download Monitor fixed vulnerable versions: >= * < 1.6.5

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.