Description
WordPress Plugin Googmonify is prone to multiple vulnerabilities, including cross-site scripting and cross-site request forgery vulnerabilities. Exploiting these issues could allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, allowing the attacker to steal cookie-based authentication credentials and launch other attacks or to perform certain administrative actions and gain unauthorized access to the affected application. WordPress Plugin Googmonify version 0.5.1 is vulnerable; prior versions may also be affected.
Remediation
Edit the source code to ensure that input is properly sanitised and CSRF protection is implemented with Nonce-like mechanism or disable the plugin until a fix is available
References
Related Vulnerabilities
WordPress Plugin WPQA-Builder forms Addon For WordPress Insecure Direct Object Reference (5.9.2)
WordPress Plugin Site Offline Or Coming Soon Or Maintenance Mode Cross-Site Request Forgery (1.4.3)
WordPress Plugin Paid Downloads 'download_key' Parameter SQL Injection (2.01)
PHP Resource Management Errors Vulnerability (CVE-2006-1549)