WordPress cat Parameter Directory Traversal Vulnerability

Summary
The host is installed with WordPress and is prone to Directory Traversal Vulnerability.
Impact
Successful attack could lead to execution of arbitrary PHP code and can even access sensitive information. Impact Level: Application
Solution
Update to Version 2.5.1 or later. http://wordpress.org/
Insight
The flaw is due to improper validation of input passed via cat parameter to index.php which is not properly sanitized in the get_category_template() function.
Affected
WordPress 2.3.3 and earlier.
References

Updated on 2017-03-28