Input validation vulnerability in Elastic Email Sender 1.2.6

The Elastic Email Sender plugin for WordPress has a security issue that could allow someone to add malicious code to webpages. To be affected, you must have a multi-site WordPress installation or have disabled a security feature called unfiltered_html. The issue affects versions up to and including 1.2.6. A person with administrator-level access or higher would be able to inject arbitrary web scripts into pages. This means that anyone who visits the page with the malicious code could be affected.

Detected in:

Elastic Email Sender open vulnerable versions: >= * <= 1.2.6

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.