Description
WordPress Plugin Ajax Search Lite is prone to a remote command execution vulnerability because it fails to properly validate user-supplied input. An attacker can exploit this issue to execute arbitrary commands within the context of the vulnerable application. WordPress Plugin Ajax Search Lite version 3.1 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 3.11 or latest
References
https://wordpress.org/support/topic/timthumb-script-
http://cxsecurity.com/issue/WLB-2014060134
https://blog.sucuri.net/2014/06/timthumb-webshot-code-execution-exploit-0-day.html
Related Vulnerabilities
Apache Traffic Server CVE-2022-47184 Vulnerability (CVE-2022-47184)
WordPress Plugin Royal Elementor Addons and Templates Arbitrary File Upload (1.3.78)
WordPress Plugin Drag and Drop Multiple File Upload-Contact Form 7 Arbitrary File Upload (1.3.5.4)
OpenSSL Use of a Broken or Risky Cryptographic Algorithm Vulnerability (CVE-2022-2097)