Input validation vulnerability in A no-code page builder for beautiful performance-based content 2.1.20

A popular tool used to create visually appealing content on WordPress websites has a security vulnerability that could potentially be exploited by hackers. This vulnerability, known as Cross-Site Request Forgery, affects all versions of the plugin up to 2.1.20. Essentially, the plugin does not properly check for a security code before carrying out certain actions, making it possible for someone without proper authorization to manipulate the website. This can be done by tricking the website administrator into clicking on a malicious link.

Detected in:

A no-code page builder for beautiful performance-based content open vulnerable versions: >= * <= 2.1.20

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.