Description
WordPress Plugin Simply Poll is prone to a cross-site scripting vulnerability and a cross-site request forgery vulnerability. An attacker can exploit these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, steal cookie-based authentication credentials, disclose or modify sensitive information, or perform unauthorized actions; other attacks are also possible. WordPress Plugin Simply Poll version 1.4.1 is vulnerable; other versions may also be affected.
Remediation
Edit the source code to ensure that input is properly sanitised and CSRF protection is implemented with Nonce-like mechanism or disable the plugin until a fix is available
References
http://www.securityfocus.com/bid/58548/exploit
http://www.exploit-db.com/exploits/24850/
http://packetstormsecurity.com/files/120833/WordPress-Simply-Poll-1.4.1-CSRF-XSS.html
Related Vulnerabilities
Moodle CVE-2023-23923 Vulnerability (CVE-2023-23923)
Apache Tomcat Time-of-check Time-of-use (TOCTOU) Race Condition Vulnerability (CVE-2022-23181)
Envoy Proxy Improper Input Validation Vulnerability (CVE-2019-9900)
WordPress Plugin Groundhogg-Marketing Automation & CRM for WordPress Cross-Site Scripting (2.0.8.1)