This plugin suffers from a sql injection in the srch_txt textfield because it is not well sanitized. It only uses the stripslashes function which does not prevent the sql injection at all.
SQL (blind) injection description
The problem was located in :cardoza_ajax_search.php file, to be more specific the_search_function() . I could see that
the srch_txt field hadn't been sanitized.
POC:
/wp-ad
via ajax
it is possible to access the database and as a consequence get user information such as usernames, passwords among other data.
Disclosure Timeline:
Vendor Notification 10/12/2012 to: the developer. He replied immediately and fixed the problem.