Viewing 7 replies - 1 through 7 (of 7 total)
  • Also getting same from Wordfence… Following…

    I’m getting the same vulnerability message from Malcare and I will have the plugin disabled untill it is fixed.

    Plugin Author Codexin Technologies

    (@cxntech)

    Thank you for escalating the concerns to us. While our initial investigation has not revealed any such vulnerabilities, rest assured, we’re conducting a more comprehensive examination to ensure the utmost security. Should we detect the reported vulnerability, we will promptly apply the necessary patches. Your vigilance is much appreciated.

    Thank you Codexin. Your efforts are appreciated. Looking forward to a resolution. Your plugin is wonderful!

    Plugin Author Codexin Technologies

    (@cxntech)

    We are pleased to announce that we have addressed the security issue mentioned earlier and resolved the problematic component successfully. Furthermore, we’ve enhanced the plugin further for code optimization and efficiency. Kindly update the plugin to the latest version, 1.3.0.

    We sincerely appreciate your continued support and patience.

    Ruben

    (@rubenvankempen)

    Good to hear. Thanks!

    amandachestnutherbs

    (@amandachestnutherbs)

    So happy to hear this! We love Media Library Helper.

Viewing 7 replies - 1 through 7 (of 7 total)
  • The topic ‘Vulnerable to Cross Site Request Forgery (CSRF)’ is closed to new replies.