Input validation vulnerability in Injection Guard 1.2.7

The Injection Guard plugin for WordPress has a security issue where hackers can inject harmful code into a website through a parameter called $_SERVER[‘REQUEST_URI’]. This can happen in versions 1.2.7 and below because the plugin does not properly check and protect against this type of attack. This means that someone without permission could potentially add harmful code to a page if they can trick a user into clicking on a link.

Detected in:

Injection Guard fixed vulnerable versions: >= * <= 1.2.7

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.