Input validation vulnerability in Tablesome – Data table & Workflow Automation ( Contact Form Entries – CF7, WPForms,.. / Email Log / OpenAI / ChatGPT ) 1.0.9

The Tablesome plugin for WordPress has a security vulnerability that could be exploited by unauthenticated attackers. This vulnerability exists in versions up to and including 1.0.8 and allows attackers to inject web scripts into pages. To exploit this vulnerability, an attacker must be able to trick a user into clicking on a link or performing another action. This is possible because the plugin does not properly sanitize user input or escape output.

Detected in:

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.