Description
WordPress Plugin Simple Link Directory is prone to a vulnerability that lets remote attackers inject and execute arbitrary code because the application fails to sanitize user-supplied input before being passed to the unserialize() PHP function. Attackers can possibly exploit this issue to execute arbitrary PHP code within the context of the affected webserver process. WordPress Plugin Simple Link Directory version 5.5.0 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 5.6.0 or latest
References
Related Vulnerabilities
Moodle Permissions, Privileges, and Access Controls Vulnerability (CVE-2013-1830)
WordPress Plugin Quiz And Survey Master-Best Quiz, Exam and Survey SQL Injection (7.1.13)
WordPress Plugin Spot.IM Comments Cross-Site Scripting (4.0.3)
WordPress Plugin YITH Custom Thank You Page for Woocommerce Security Bypass (1.1.6)
WordPress Plugin Import and export users and customers CSV Injection (1.16.3.5)