Description
WordPress Plugin Simply Poll is prone to a cross-site scripting vulnerability and a cross-site request forgery vulnerability. An attacker can exploit these issues to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site, steal cookie-based authentication credentials, disclose or modify sensitive information, or perform unauthorized actions; other attacks are also possible. WordPress Plugin Simply Poll version 1.4.1 is vulnerable; other versions may also be affected.
Remediation
Edit the source code to ensure that input is properly sanitised and CSRF protection is implemented with Nonce-like mechanism or disable the plugin until a fix is available
References
http://www.securityfocus.com/bid/58548/exploit
http://www.exploit-db.com/exploits/24850/
http://packetstormsecurity.com/files/120833/WordPress-Simply-Poll-1.4.1-CSRF-XSS.html
Related Vulnerabilities
Oracle Application Server Other Vulnerability (CVE-2002-0568)
WordPress Plugin NextGEN Gallery-WordPress Gallery SQL Injection (3.2.10)
WordPress Plugin Chatbot with IBM Watson Cross-Site Scripting (0.8.20)
LimeSurvey Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2011-3752)
WordPress Plugin Import any XML or CSV File to WordPress Arbitrary File Upload (3.6.7)