Description
WordPress Plugin Subscribe Form is prone to a remote command execution vulnerability because it fails to properly validate user-supplied input. An attacker can exploit this issue to execute arbitrary commands within the context of the vulnerable application. WordPress Plugin Subscribe Form version 1.1 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 1.2 or latest
References
https://www.exploit-db.com/exploits/37111/
http://osvdb.org/show/osvdb/121081
http://plugins.svn.wordpress.org/mailchimp-subscribe-sm/tags/1.1/data.php
https://plugins.trac.wordpress.org/browser/mailchimp-subscribe-sm/tags/1.2/data.php?rev=1128995
Related Vulnerabilities
WordPress Plugin Fancy Product Designer-WooCommerce Cross-Site Request Forgery (4.7.5)
WordPress Plugin WP Hotel Booking Cross-Site Request Forgery (1.10.1)
Drupal Core 4.7.x Arbitrary Code Execution (4.7.0)
Oracle Database Server CVE-2010-4413 Vulnerability (CVE-2010-4413)
Apache HTTP Server CVE-2004-0751 Vulnerability (CVE-2004-0751)