Description
WordPress Plugin Testimonial is prone to multiple vulnerabilities, including cross-site scripting, cross-site request forgery and SQL injection vulnerabilities. Exploiting these issues may allow an attacker to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, to steal cookie-based authentication credentials, to gain unauthorized access and perform certain administrative actions, to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. WordPress Plugin Testimonial version 2.2 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 2.3 or latest
References
http://www.exploit-db.com/exploits/28054/
http://archives.neohapsis.com/archives/fulldisclosure/2013-09/0003.html
Related Vulnerabilities
PHP Improper Link Resolution Before File Access ('Link Following') Vulnerability (CVE-2007-4652)
WordPress Plugin SP Project & Document Manager Cross-Site Scripting (4.25)
WordPress Plugin Gallery by BestWebSoft Cross-Site Scripting (4.4.9)
Moodle Improper Input Validation Vulnerability (CVE-2018-1137)