Description
WordPress Plugin pipdig Power pack (p3) contains suspicious code. Attackers can exploit this issue to perform a variety of actions: reset password, delete database, etc. Successful attacks will compromise the affected application and possibly the webserver or computer. WordPress Plugin pipdig Power pack (p3) version 4.7.3 is vulnerable; prior versions may also be affected.
Remediation
Disable the plugin until a fix is available
References
https://www.wordfence.com/blog/2019/03/peculiar-php-present-in-popular-pipdig-power-pack-plugin/
https://www.jemjabella.co.uk/2019/security-alert-pipdig-insecure-ddosing-competitors/
Related Vulnerabilities
Opencart Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2010-1610)
WordPress Plugin Popup Maker-Popup for opt-ins, lead gen, & more Security Bypass (1.7.29)
WordPress Plugin Powerplay Gallery Multiple Vulnerabilities (3.3)
Ruby on Rails Permissions, Privileges, and Access Controls Vulnerability (CVE-2013-0155)
WordPress Plugin Admin username changer Unspecified Vulnerability (1.0)