Description
WordPress Plugin Shantz WordPress QOTD is prone to a cross-site request forgery vulnerability. Exploiting this issue may allow a remote attacker to perform certain administrative actions and gain unauthorized access to the affected application; other attacks are also possible. WordPress Plugin Shantz WordPress QOTD version 1.2.2 is vulnerable; prior versions may also be affected.
Remediation
Edit the source code to ensure that CSRF protection is implemented with Nonce-like mechanism or disable the plugin until a fix is available
References
https://sploitus.com/exploit?id=WPEX-ID:1DD0F9A8-22AB-4ECC-A925-605822739000
https://wordpress.org/plugins/shantz-wordpress-qotd/#description
Related Vulnerabilities
Jenkins Permissions, Privileges, and Access Controls Vulnerability (CVE-2014-2058)
MySQL CVE-2017-3465 Vulnerability (CVE-2017-3465)
WordPress Plugin Simple 301 Redirects by BetterLinks Unspecified Vulnerability (1.06)
WordPress Plugin Easy Contact Form Builder Cross-Site Scripting (1.0)
TYPO3 Improper Input Validation Vulnerability (CVE-2010-3667)