Description
WordPress Plugin User Control is prone to an SQL injection vulnerability because it fails to sufficiently sanitize user-supplied data before using it in an SQL query. Exploiting this issue could allow an attacker to compromise the application, access or modify data, or exploit latent vulnerabilities in the underlying database. WordPress Plugin User Control version 2.1.0 is vulnerable; prior versions may also be affected.
Remediation
Edit the source code to ensure that input is properly sanitised or disable the plugin until a fix is available
References
Related Vulnerabilities
MySQL Improper Input Validation Vulnerability (CVE-2006-4227)
WordPress Plugin Master Slider-Responsive Touch Slider Cross-Site Scripting (2.7.1)
Oracle Database Server CVE-2013-5853 Vulnerability (CVE-2013-5853)
Plone CMS Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-4043)
WordPress Plugin WordPoints Multiple Vulnerabilities (1.10.2)