Vinoj Cardoza WordPress Poll Plugin v36 and lower executes SQL statement passed in via the pollid POST parameter due to a lack of user input escaping. This allows users who craft specific SQL statements to dump the entire targets database.
Source: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-24315
Reference (s):
- https://wordpress.org/plugins/cardoza-wordpress-poll/
- https://zeroaptitude.com/zerodetail/wordpress-plugin-bug-hunting-part-1/

