Description
WordPress Plugin jQuery Reply to Comment is prone to a cross-site request forgery vulnerability. Exploiting this issue may allow a remote attacker to perform certain administrative actions and gain unauthorized access to the affected application; other attacks are also possible. WordPress Plugin jQuery Reply to Comment version 1.31 is vulnerable; prior versions may also be affected.
Remediation
Edit the source code to ensure that CSRF protection is implemented with Nonce-like mechanism or disable the plugin until a fix is available
References
https://sploitus.com/exploit?id=WPEX-ID:AA23F743-811B-4FD1-81A9-42916342E312
https://wordpress.org/plugins/jquery-reply-to-comment/#description
Related Vulnerabilities
WordPress Other Vulnerability (CVE-2006-1796)
PHP Permissions, Privileges, and Access Controls Vulnerability (CVE-2007-3007)
WordPress Plugin Simple Instagram Feed Cross-Site Scripting (1.3)
WordPress Plugin The Holiday Calendar Cross-Site Scripting (1.11.2)
WordPress Plugin All-In-One Security (AIOS)-Security and Firewall SQL Injection (4.0.8)