Description
WordPress Plugin Plainview Activity Monitor is prone to a remote command execution vulnerability because it fails to properly validate user-supplied input. An attacker can exploit this issue to execute arbitrary commands within the context of the vulnerable application. WordPress Plugin Plainview Activity Monitor version 20161228 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 20180826 or latest
References
https://github.com/aas-n/CVE/tree/master/plainview-activity-monitor
https://www.exploit-db.com/exploits/45274/
https://plugins.svn.wordpress.org/plainview-activity-monitor/trunk/readme.txt
Related Vulnerabilities
WordPress Plugin Chameleoni Jobs Multiple Cross-Site Scripting Vulnerabilities (1.2.2)
PHP Permissions, Privileges, and Access Controls Vulnerability (CVE-2007-1460)
Oracle Database Server CVE-2019-2484 Vulnerability (CVE-2019-2484)
WordPress Plugin Stream Cross-Site Scripting (3.0.5)
WordPress Plugin Content Control-User Access Restriction Cross-Site Scripting (1.1.9)