Input validation vulnerability in WP Default Feature Image 1.0.1.1

The WP Default Feature Image plugin for WordPress has a problem which can allow attackers with administrator-level permissions to inject malicious scripts into pages. This is a serious security issue and affects multi-site installations and installations where unfiltered_html has been disabled. Versions up to and including 1.0.1.1 are vulnerable to this issue due to a lack of proper input sanitization and output escaping.

Detected in:

WP Default Feature Image open vulnerable versions: >= * <= 1.0.1.1

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.