Description
WordPress Plugin Photoracer is prone to multiple cross-site scripting and SQL injection vulnerabilities because it fails to sufficiently sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, to steal cookie-based authentication credentials and launch other attacks, to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. WordPress Plugin Photoracer version 1.0 is vulnerable; prior versions may also be affected.
Remediation
Edit the source code to ensure that input is properly sanitised or disable the plugin until a fix is available
References
http://www.securityfocus.com/bid/49328/exploit
http://www.exploit-db.com/exploits/17731/
http://www.exploit-db.com/exploits/17720/
http://packetstormsecurity.com/files/view/104541/wpphotoracer-sqlxss.txt
Related Vulnerabilities
WordPress Plugin WP Mail Logging Multiple Unspecified Vulnerabilities (1.5.0)
WordPress Improper Input Validation Vulnerability (CVE-2016-9263)
WordPress Plugin Pinterest Feed Multiple Vulnerabilities (1.1.1)
WordPress Plugin Monarch Social Sharing Security Bypass (1.2.6)
WordPress Plugin PayPlus Payment Gateway SQL Injection (7.0.7)