Description
It was determined that your web application is performing PHP object deserialization of user-supplied data. Arbitrary object deserialization is inherently unsafe, and should never be performed on untrusted data. Consult Web references section for more information about this issue.
Remediation
PHP object deserialization should not be performed on user-supplied data. Do not use the unserialize() function with user-supplied input, use JSON functions instead.
References
Related Vulnerabilities
WordPress Plugin Slideshow Gallery Arbitrary File Upload (1.4.6)
PHP mail function ASCII control character header spoofing vulnerability
WordPress Plugin Export Users to CSV CSV Injection (1.1.1)
WordPress Plugin Cms Pack TimThumb Arbitrary File Upload (1.3)
WordPress Plugin WP-Syntax Remote PHP Code Execution (0.9.9)