Description
WordPress Plugin Simply Poll is prone to a cross-site scripting vulnerability and a cross-site request forgery vulnerability. An attacker can exploit these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, steal cookie-based authentication credentials, disclose or modify sensitive information, or perform unauthorized actions; other attacks are also possible. WordPress Plugin Simply Poll version 1.4.1 is vulnerable; other versions may also be affected.
Remediation
Edit the source code to ensure that input is properly sanitised and CSRF protection is implemented with Nonce-like mechanism or disable the plugin until a fix is available
References
http://www.securityfocus.com/bid/58548/exploit
http://www.exploit-db.com/exploits/24850/
http://packetstormsecurity.com/files/120833/WordPress-Simply-Poll-1.4.1-CSRF-XSS.html
Related Vulnerabilities
WordPress Plugin My Calendar Cross-Site Scripting (2.4.18)
WordPress Plugin Related Posts for WordPress Cross-Site Scripting (1.8.1)
WordPress Plugin WP Rss Poster SQL Injection (1.0.0)
WordPress Plugin WP Retina 2x Cross-Site Scripting (5.2.0)
WordPress Plugin StatPress Multiple Unspecified Vulnerabilities (1.4.1)