Description
WordPress Plugin Photoracer is prone to multiple cross-site scripting and SQL injection vulnerabilities because it fails to sufficiently sanitize user-supplied input. An attacker may leverage these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, to steal cookie-based authentication credentials and launch other attacks, to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. WordPress Plugin Photoracer version 1.0 is vulnerable; prior versions may also be affected.
Remediation
Edit the source code to ensure that input is properly sanitised or disable the plugin until a fix is available
References
http://www.securityfocus.com/bid/49328/exploit
http://www.exploit-db.com/exploits/17731/
http://www.exploit-db.com/exploits/17720/
http://packetstormsecurity.com/files/view/104541/wpphotoracer-sqlxss.txt
Related Vulnerabilities
WordPress Plugin simple sort&search Cross-Site Scripting (0.0.3)
WordPress Plugin File Manager Advanced Shortcode Directory Traversal (2.4)
WordPress Plugin ProfileGrid-User Profiles, Groups and Communities Privilege Escalation (5.8.9)
Nginx Uncontrolled Resource Consumption Vulnerability (CVE-2018-16844)