Input validation vulnerability in Magty 1.0.6

The Magty theme for WordPress has a security issue called Local File Inclusion. This means that someone who is not logged in can access and run any files they want on the server. This can be used to get around security measures, get private information, or run code on the server. This can happen even if the file types are considered safe, like images.

Detected in:

Magty fixed vulnerable versions: >= * <= 1.0.6

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.