Input validation vulnerability in WP Fast Cache 1.4

The WP Fast Cache plugin for WordPress is vulnerable to a security flaw known as Cross-Site Request Forgery. This means that versions 1.4 and below of this plugin are affected. The issue arises due to the ‘wp_fast_cache_bulk_action_url’ variable, which has not been properly sanitized or escaped. This means that unauthenticated attackers can gain access to administrative actions that they would otherwise not be able to access, and this can lead to Cross-Site Scripting attacks if a malicious link is clicked by a site administrator.

Detected in:

WP Fast Cache open vulnerable versions: >= * <= 1.4

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.