Description
WordPress Plugin Ajax Search Lite is prone to a remote command execution vulnerability because it fails to properly validate user-supplied input. An attacker can exploit this issue to execute arbitrary commands within the context of the vulnerable application. WordPress Plugin Ajax Search Lite version 3.1 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 3.11 or latest
References
https://wordpress.org/support/topic/timthumb-script-
http://cxsecurity.com/issue/WLB-2014060134
https://blog.sucuri.net/2014/06/timthumb-webshot-code-execution-exploit-0-day.html
Related Vulnerabilities
Ruby Improper Input Validation Vulnerability (CVE-2018-8779)
WordPress Other Vulnerability (CVE-2007-0233)
Moodle Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2023-28335)
WordPress Plugin WordPress Photo Gallery by Gallery Bank Cross-Site Scripting (3.0.69)
Grafana Improper Authentication Vulnerability (CVE-2021-28148)