Description
WordPress Plugin Tune Library is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. Successful exploitation requires that "magic_quotes" directive is set to "Off" and plugin setting "Filter artists by letter and show alphabetical navigation" is turned on. WordPress Plugin Tune Library version 1.5.1 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 1.5.2 or latest
References
http://www.securityfocus.com/bid/49553/exploit
http://www.exploit-db.com/exploits/17816/
http://packetstormsecurity.com/files/view/104971/wptunelibrary-sql.txt
Related Vulnerabilities
PHP Improper Input Validation Vulnerability (CVE-2015-4598)
WordPress Plugin Debug Bar Unspecified Vulnerability (0.8)
MediaWiki Improper Authentication Vulnerability (CVE-2014-2665)
WordPress Plugin pipdig Power pack (p3) Backdoor (4.7.3)
WordPress Plugin Contact Form Entries-Contact Form 7, WPforms and more Cross-Site Scripting (1.2.0)