Input validation vulnerability in Post Timeline 2.2.5

The Post Timeline plugin for WordPress has a security vulnerability that could allow unauthenticated attackers to inject malicious code into pages on a website. This vulnerability exists in versions of the plugin up to and including version 2.2.5. The issue arises from the plugin not properly sanitizing user input and not properly encoding output, which allows attackers to inject web scripts into a page. If a user can be tricked into taking action, such as clicking a link, the malicious code will be executed.

Detected in:

Post Timeline fixed vulnerable versions: >= * <= 2.2.5

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.