Security for everyone

CVE-2018-16159 Scanner

Detects 'SQL Injection (SQLi)' vulnerability in Gift Vouchers plugin for WordPress affects v. before 4.1.8.


Short Info



Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 sec

Scan only one

Domain, Ipv4



The Gift Vouchers plugin for WordPress is a popular tool used by online retailers and small businesses to create and sell digital gift vouchers. These vouchers can be customized, offer discounts, and include unique promotional codes for customers to use. This plugin helps businesses expand their customer base, increase sales, and enhance their marketing strategies.

However, the Gift Vouchers plugin has recently been detected with a critical security vulnerability: CVE-2018-16159. This vulnerability allows an attacker to inject malicious SQL code into the template_id parameter of the wp-admin/admin-ajax.php wpgv_doajax_front_template request. This allows the attacker to access sensitive information on the database, make changes or deletions to data, or even gain unauthorized access to the website itself.

If this vulnerability is exploited, it could lead to disastrous consequences for the website owner. Sensitive customer information such as names, email addresses, and financial data could be stolen. The attacker could also gain unauthorized access to the website's backend, gaining administrative privileges and controlling the entire website.

Using the platform, businesses and website owners can access powerful tools and resources that enable them to quickly and easily identify, assess, and mitigate vulnerabilities in their digital assets. With pro features such as vulnerability scanning, risk assessment, and expert advice, provides comprehensive protection against security threats and can prevent serious data breaches. By utilizing these tools and taking the necessary precautions, businesses can keep their customers' information safe and secure, without compromising their growth and success.



cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture