Description
WordPress Plugin Ajax Pagination (twitter Style) is prone to a local file inclusion vulnerability because it fails to sufficiently sanitize user-supplied input. Exploiting this issue may allow an attacker to obtain sensitive information that could aid in further attacks. WordPress Plugin Ajax Pagination (twitter Style) version 1.1 is vulnerable; prior versions may also be affected.
Remediation
Edit the source code to ensure that input is properly verified or disable the plugin until a fix is available
References
http://www.exploit-db.com/exploits/32622/
http://seclists.org/fulldisclosure/2014/Mar/398
http://packetstormsecurity.com/files/125929/Ajax-Pagination-1.1-Local-File-Inclusion.html
Related Vulnerabilities
ProjectSend Improper Privilege Management Vulnerability (CVE-2020-28874)
WordPress Plugin GigPress Multiple Vulnerabilities (2.3.10)
WordPress Plugin Broken Link Checker Multiple Cross-Site Scripting Vulnerabilities (1.9.1)
WordPress Plugin Flipbox-Awesomes Flip Boxes Image Overlay Security Bypass (2.6.0)