Input validation vulnerability in Owl Carousel 0.5.3

The Owl Carousel plugin for WordPress has a security vulnerability that could allow an attacker with editor-level access or above to inject dangerous web scripts into pages that will be executed when someone visits the page. This vulnerability is present in all versions of the plugin up to and including 0.5.3 and is caused by a lack of proper sanitization of user inputs and proper escaping of outputs.

Detected in:

Owl Carousel open vulnerable versions: >= * <= 0.5.3

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.