WordPress Multi View Event Calendar SQL Injection Vulnerability

Summary
This host is installed with WordPress Multi View Event Calendar plugin and is prone to sql-injection vulnerability.
Impact
Successful exploitation will allow attacker to manipulate SQL queries in the backend database allowing for the manipulation or disclosure of arbitrary data. Impact Level: Application
Solution
No solution or patch is available as of 9th February, 2015. Information regarding this issue will be updated once the solution details are available. For updates refer to https://wordpress.org/plugins/cp-multi-view-calendar/
Insight
Input passed via the 'calid' GET parameter is not properly sanitized before being returned to the user.
Affected
CP Multi View Event Calendar version 1.01
Detection
Send a crafted data via HTTP GET request and check whether it is able to execute sql query or not.
References