Description
WordPress Plugin ImageDrop is prone to a blind SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. WordPress Plugin ImageDrop version 1.1.2 is vulnerable; prior versions may also be affected.
Remediation
Edit the source code to ensure that input is properly sanitised or disable the plugin until a fix is available
References
http://1337day.com/exploits/18529
http://packetstormsecurity.com/files/113430/WordPress-ImageDrop-1.1.2-Blind-SQL-Injection.html
Related Vulnerabilities
Sqlite Use After Free Vulnerability (CVE-2020-13871)
Python Improper Restriction of XML External Entity Reference Vulnerability (CVE-2013-0340)
XOOPS Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2011-3822)
WordPress Plugin WP Visitor Statistics (Real Time Traffic) SQL Injection (5.5)
WordPress Plugin Visual Email Designer for WooCommerce SQL Injection (1.7.1)