Input validation vulnerability in No Page Comment 1.1

The No Page Comment plugin for WordPress is not secure in versions up to 1.1. This means that someone who is not authorized could send a fake request, such as a link, to a site administrator. If the administrator clicks on the link, then the plugin settings could be changed without the administrator’s permission. To fix this issue, the plugin needs to include validation for nonce on the no-page-comment-settings.php file.

Detected in:

No Page Comment fixed vulnerable versions: >= * <= 1.1

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.