Description
WordPress Plugin Collision Testimonials is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. Successful exploitation requires that attacker is logged in as "admin". WordPress Plugin Collision Testimonials version 3.0 is vulnerable; other versions may also be affected.
Remediation
Edit the source code to ensure that input is properly sanitised or disable the plugin until a fix is available
References
http://www.securityfocus.com/bid/49340/exploit
http://www.exploit-db.com/exploits/17729/
http://packetstormsecurity.com/files/view/104522/wpcollision-sql.txt
Related Vulnerabilities
WordPress Plugin Visual Form Builder Cross-Site Scripting (3.0.3)
Jboss EAP CVE-2013-1896 Vulnerability (CVE-2013-1896)
WordPress Plugin WP Photo Album Plus Cross-Site Scripting (5.0.2)
WordPress Plugin Simple Image Sizes Unspecified Vulnerability (2.2.4)
WordPress Plugin MAZ Loader-Preloader Builder for WordPress SQL Injection (1.3.2)