Description
WordPress Plugin U Extended Comment is prone to a vulnerability that lets attackers download arbitrary files because the application fails to sufficiently verify user-supplied input. An attacker can exploit this issue to gain access to sensitive information which may lead to other attacks. Successful exploitation requires "Attachment" permissions. WordPress Plugin U Extended Comment version 1.0.1 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 1.0.2 or latest
References
Related Vulnerabilities
Squid Resource Management Errors Vulnerability (CVE-2011-4096)
User Avatar TimThumb Arbitrary File Upload (1.3.7)
Category Grid View Gallery TimThumb Arbitrary File Upload (0.1.1)
Atlassian Jira URL Redirection to Untrusted Site ('Open Redirect') Vulnerability (CVE-2021-39112)
Ninja Forms with File Uploads Extension Cross-Site Scripting (3.3.12)