Description
WordPress Plugin Sniplets is prone to multiple input validation vulnerabilities because the application fails to sanitize user-supplied input. These issues include multiple cross-site scripting vulnerabilities, a remote file include vulnerability, and a remote command execution vulnerability. A successful exploit may allow an attacker to compromise the application, steal cookie-based authentication credentials, and execute arbitrary code and commands within the context of the webserver process. WordPress Plugin Sniplets version 1.2.2 is vulnerable; other versions may also be affected.
Remediation
Update to plugin version 1.2.3 or latest
References
http://www.exploit-db.com/exploits/5194/
http://www.securityfocus.com/bid/27985/exploit
http://www.securityfocus.com/archive/1/488734
http://packetstormsecurity.com/files/view/64011/wordpresssniplet-rfixssexec.txt
Related Vulnerabilities
Apache Tomcat version older than 5.5.26
Apache Tomcat Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-0714)
Ruby on Rails Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2020-8166)
Moodle Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-4400)
WordPress Plugin Post Title Counter Cross-Site Scripting (1.1)