Input validation vulnerability in Comment-Emailer 1.0.5

The Comment-Emailer plugin for WordPress has a security issue where it can be vulnerable to a type of attack called Cross-Site Request Forgery. This can happen in all versions up to 1.0.5. The problem is caused by a function that doesn’t properly check for a certain security code. This means that someone who is not logged in or authorized can change the plugin’s settings or add harmful code to the website by tricking the site administrator into clicking on a harmful link.

Detected in:

Comment-Emailer open vulnerable versions: >= * <= 1.0.5

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.