Input validation vulnerability in Lazyest Backup 0.2.2

The Lazyest Backup plugin for WordPress has a security vulnerability that can be exploited by unauthenticated attackers. This vulnerability affects versions up to 0.2.2 and allows them to inject malicious web scripts into pages. These scripts will execute if the attacker can convince a user to perform an action like clicking a link. This vulnerability is caused by not properly sanitizing input or escaping output in the ‘xml_or_all’ parameter of the lazyest-backup.php file.

Detected in:

Lazyest Backup open vulnerable versions: >= * < 0.2.2

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.