Description
WordPress Plugin Photoracer is prone to multiple cross-site scripting and SQL injection vulnerabilities because it fails to sufficiently sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, to steal cookie-based authentication credentials and launch other attacks, to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. WordPress Plugin Photoracer version 1.0 is vulnerable; prior versions may also be affected.
Remediation
Edit the source code to ensure that input is properly sanitised or disable the plugin until a fix is available
References
http://www.securityfocus.com/bid/49328/exploit
http://www.exploit-db.com/exploits/17731/
http://www.exploit-db.com/exploits/17720/
http://packetstormsecurity.com/files/view/104541/wpphotoracer-sqlxss.txt
Related Vulnerabilities
DOMPurify URL Redirection to Untrusted Site ('Open Redirect') Vulnerability (CVE-2019-25155)
Drupal Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-2153)
WordPress Plugin Custom Simple Rss Cross-Site Request Forgery (2.0.6)
WordPress Plugin Contus HD FLV Player 'process-sortable.php' SQL Injection (1.3)
WordPress Plugin WP Post to PDF Cross-Site Scripting (2.3.1)