Description
WordPress Plugin One User Avatar-User Profile Picture is prone to multiple vulnerabilities, including cross-site scripting and cross-site request forgery vulnerabilities. Exploiting these issues could allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, allowing the attacker to steal cookie-based authentication credentials and launch other attacks, or to perform certain administrative actions and gain unauthorized access to the affected application. WordPress Plugin One User Avatar-User Profile Picture version 2.3.6 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 2.3.7 or latest
References
https://sploitus.com/exploit?id=WPEX-ID:762C506A-F57D-450F-99C0-32D750306DDC
https://sploitus.com/exploit?id=WPEX-ID:9B9A55D5-C121-4B5B-80DF-F9F419C0DC55
https://plugins.svn.wordpress.org/one-user-avatar/trunk/readme.txt
Related Vulnerabilities
MediaWiki Other Vulnerability (CVE-2005-3166)
Java Denial of Service (DoS) Vulnerability (CVE-2018-3180)
SharePoint CVE-2018-8161 Vulnerability (CVE-2018-8161)
Oracle Application Server Other Vulnerability (CVE-2002-2153)
WordPress Plugin MapPress Maps for WordPress Cross-Site Request Forgery (2.53.8)