Description
WordPress Plugin Giveaway Boost is prone to a vulnerability that lets remote attackers inject and execute arbitrary code because the application fails to sanitize user-supplied input before being passed to the unserialize() PHP function. Attackers can possibly exploit this issue to execute arbitrary PHP code within the context of the affected webserver process. WordPress Plugin Giveaway Boost version 2.1.2 is vulnerable; prior versions may also be affected.
Remediation
Disable the plugin until a fix is available
References
Related Vulnerabilities
WordPress Plugin Simple File List Arbitrary File Download (3.2.7)
WordPress Plugin Product Filter for WooCommerce Security Bypass (8.1.1)
Joomla! Core 2.5.x Security Bypass (2.5.0 - 2.5.4)
Apache Tomcat Other Vulnerability (CVE-2010-3718)
Jboss EAP Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2014-0248)