Description
WordPress Plugin WP Custom Cursors is prone to multiple vulnerabilities, including SQL injection and cross-site request forgery vulnerabilities. Exploiting these issues may allow a remote attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database, or to perform certain administrative actions and gain unauthorized access to the affected application; other attacks are also possible. WordPress Plugin WP Custom Cursors version 3.0 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 3.0.1 or latest
References
https://sploitus.com/exploit?id=WPEX-ID:4C13A93D-2100-4721-8937-A1205378655F
https://sploitus.com/exploit?id=WPEX-ID:27816C70-58AD-4FFB-ADCC-69EB1B210744
https://sploitus.com/exploit?id=WPEX-ID:BB0806D7-21E3-4A65-910C-BF0625C338EC
https://plugins.svn.wordpress.org/wp-custom-cursors/trunk/README.txt