Input validation vulnerability in PatioTime – Restaurant WordPress Theme 2.1

The PatioTime theme for WordPress has a vulnerability in versions up to 2.1 called Local File Inclusion. This means that people who are not logged in can access and run any files they want on the server. These files can contain harmful PHP code that can bypass security measures, access private information, or even take control of the website. This issue is especially problematic because even seemingly harmless files like images can be used to exploit the vulnerability.

Detected in:

PatioTime - Restaurant WordPress Theme fixed vulnerable versions: >= * < 2.1

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.