Description
WordPress Plugin Ajax Search Lite is prone to a remote command execution vulnerability because it fails to properly validate user-supplied input. An attacker can exploit this issue to execute arbitrary commands within the context of the vulnerable application. WordPress Plugin Ajax Search Lite version 3.1 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 3.11 or latest
References
https://wordpress.org/support/topic/timthumb-script-
http://cxsecurity.com/issue/WLB-2014060134
https://blog.sucuri.net/2014/06/timthumb-webshot-code-execution-exploit-0-day.html
Related Vulnerabilities
CrushFTP Server Deserialization of Untrusted Data Vulnerability (CVE-2017-14035)
WordPress 4.4 Cross-Site Scripting Vulnerability (4.4)
e107 Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2018-16388)
PHP Use of Externally-Controlled Format String Vulnerability (CVE-2009-3294)
Chamilo Improper Privilege Management Vulnerability (CVE-2020-23128)