Description
WordPress Plugin pipdig Power pack (p3) contains suspicious code. Attackers can exploit this issue to perform a variety of actions: reset password, delete database, etc. Successful attacks will compromise the affected application and possibly the webserver or computer. WordPress Plugin pipdig Power pack (p3) version 4.7.3 is vulnerable; prior versions may also be affected.
Remediation
Disable the plugin until a fix is available
References
https://www.wordfence.com/blog/2019/03/peculiar-php-present-in-popular-pipdig-power-pack-plugin/
https://www.jemjabella.co.uk/2019/security-alert-pipdig-insecure-ddosing-competitors/
Related Vulnerabilities
Drupal Permissions, Privileges, and Access Controls Vulnerability (CVE-2008-2771)
WordPress Plugin Tajer Arbitrary File Upload (1.0.5)
Oracle Application Server CVE-2002-1637 Vulnerability (CVE-2002-1637)
WordPress Other Vulnerability (CVE-2007-0540)
Jboss EAP Files or Directories Accessible to External Parties Vulnerability (CVE-2021-3717)