Input validation vulnerability in Subscribe to Comments 2.1.2

The Subscribe to Comments for WordPress plugin is vulnerable to certain types of cyber attacks for versions up to 2.1.2. These attacks, which require authentication and administrative privileges, allow an attacker to include and execute any arbitrary file on the server. This could be used to bypass security measures, gain access to sensitive information, or even execute malicious code. Additionally, this same function can be used to execute any type of PHP code.

Detected in:

Subscribe to Comments fixed vulnerable versions: >= * <= 2.1.2

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.