Is "Open User Map | Everybody can add locations" safe?
WordPress Plugin security and safety information.
Rating: Good (current version safe)
Recommendations
Open User Map | Everybody can add locations: Plugin Details
| Type: | Plugin |
| Author: | 100plugins |
| URL: | https://wordpress.org/plugins/open-user-map/ |
| Latest Version: | 1.4.4 |
Open User Map | Everybody can add locations: Security Information
| Insecure versions: | Up To 1.3.14 |
| Known since: | 2023-08-09 22:12:51 |
| Insecure versions: | Up To 1.3.14 |
| Known since: | 2023-08-09 22:12:51 |
Open User Map | Everybody can add locations: Safety Recommendations
We have rated Open User Map | Everybody can add locations as Good (current version safe) which means that we have found vulnerabilities in older versions.
We recommend that you only use the latest version of Open User Map | Everybody can add locations.
Open User Map | Everybody can add locations: Staying Up-to-date
Make sure your installation of Open User Map | Everybody can add locations is safe with the following free Jetpack services for WordPress sites:
- Updates & Management
Turn on auto-updates for Open User Map | Everybody can add locations or manage in bulk. - Prevent Infiltrations
Automatic protection against brute force attacks and secure sign on.
Open User Map | Everybody can add locations: Keeping Safe
If you're running a business, ecommerce, news, or other critical website, Jetpack also provides additional indispensable services:
- Automated Backups
Full backup of your entire site with unlimited storage space. - Restores & Migrations
Restore or migrate your site from a backup with one click. - Security Scanning
Regular, automated scans of your site for malware, threats, and hacks. - Expert Support
Fast, priority support for any WordPress security issue.
About this information
This WordPress security information is part of our security library and is brought to you by Jetpack as part of our committment to a safer WordPress experience.
If you have any questions, please do not hesitate to contact us.