Description
WordPress Plugin Testimonial is prone to multiple vulnerabilities, including cross-site scripting, cross-site request forgery and SQL injection vulnerabilities. Exploiting these issues may allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, to steal cookie-based authentication credentials, to gain unauthorized access and perform certain administrative actions, to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. WordPress Plugin Testimonial version 2.2 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 2.3 or latest
References
http://www.exploit-db.com/exploits/28054/
http://archives.neohapsis.com/archives/fulldisclosure/2013-09/0003.html
Related Vulnerabilities
Artifactory Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2021-23163)
Moodle Other Vulnerability (CVE-2007-1647)
WordPress Plugin Post Views Count (Support caching plugins!) Cross-Site Scripting (3.0.2)
PrestaShop Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2022-21686)
Drupal Exposure of Resource to Wrong Sphere Vulnerability (CVE-2020-13670)