WordPress Content Source Control Plugin Directory Traversal Vulnerability

Summary
This host is installed with WordPress Content Source Control plugin and is prone to directory traversal vulnerability.
Impact
Successful exploitation will allow attacker to read arbitrary files on the target system. Impact Level: System/Application
Solution
Upgrade to version 3.1.0 or later, For updates refer to https://wordpress.org/plugins/wp-source-control
Insight
Input passed via the 'path' parameter to download.php script is not properly sanitized before being returned to the user
Affected
WordPress Content Source Control plugin version 3.0.0 and earlier.
Detection
Send a crafted data via HTTP GET request and check whether it is possible to read a local file
References