Description
It was determined that your web application is performing PHP object deserialization of user-supplied data. Arbitrary object deserialization is inherently unsafe, and should never be performed on untrusted data. Consult Web references section for more information about this issue.
Remediation
PHP object deserialization should not be performed on user-supplied data. Do not use the unserialize() function with user-supplied input, use JSON functions instead.
References
Related Vulnerabilities
WordPress Plugin Profiles 'bio-img.php' SQL Injection (2.0RC1)
WordPress Plugin WP Visitor Statistics (Real Time Traffic) SQL Injection (4.7)
WordPress Plugin Users Ultra SQL Injection (1.3.58)
WordPress Plugin InLinks SQL Injection (1.0)
WordPress Plugin Header Footer Code Manager SQL Injection (1.1.13)