Description
It was determined that your web application is performing PHP object deserialization of user-supplied data. Arbitrary object deserialization is inherently unsafe, and should never be performed on untrusted data. Consult Web references section for more information about this issue.
Remediation
PHP object deserialization should not be performed on user-supplied data. Do not use the unserialize() function with user-supplied input, use JSON functions instead.
References
Related Vulnerabilities
WordPress Plugin WassUp Real Time Analytics 'spy.php' SQL Injection (1.4.3)
WordPress Plugin CBX Petition for WordPress SQL Injection (1.0.3)
WordPress Plugin Events Manager 'events-manager.php' SQL Injection (2.1)
WordPress Plugin Blogger To WordPress SQL Injection (2.2.1)
WordPress Plugin Double Opt-In for Download SQL Injection (2.0.8)