Description
WordPress Plugin Simply Poll is prone to a cross-site scripting vulnerability and a cross-site request forgery vulnerability. An attacker can exploit these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, steal cookie-based authentication credentials, disclose or modify sensitive information, or perform unauthorized actions; other attacks are also possible. WordPress Plugin Simply Poll version 1.4.1 is vulnerable; other versions may also be affected.
Remediation
Edit the source code to ensure that input is properly sanitised and CSRF protection is implemented with Nonce-like mechanism or disable the plugin until a fix is available
References
http://www.securityfocus.com/bid/58548/exploit
http://www.exploit-db.com/exploits/24850/
http://packetstormsecurity.com/files/120833/WordPress-Simply-Poll-1.4.1-CSRF-XSS.html
Related Vulnerabilities
Oracle Database Server CVE-2018-3004 Vulnerability (CVE-2018-3004)
WordPress Same Origin Method Execution (SOME) Vulnerability (0.70 - 3.7.13)
WordPress Plugin WP-PostRatings '[ratings]' Shortcode SQL Injection (1.61)
WordPress Plugin BulletProof Security Multiple Cross-Site Scripting Vulnerabilities (.53.2)