Description
WordPress Plugin Delightful Downloads is prone to a directory traversal vulnerability because it fails to sufficiently verify user-supplied input. Exploiting this issue can allow an attacker to obtain sensitive information that could aid in further attacks. WordPress Plugin Delightful Downloads version 1.6.6 is vulnerable; prior versions may also be affected.
Remediation
Edit the source code to ensure that input is properly verified or disable the plugin until a fix is available
References
https://github.com/jqueryfiletree/jqueryfiletree/issues/66
https://github.com/A5hleyRich/delightful-downloads/issues/165
https://www.exploit-db.com/exploits/49693
https://wordpress.org/plugins/delightful-downloads/#description
Related Vulnerabilities
WordPress Plugin Theme Demo Import Arbitrary File Upload (1.1.0)
Dotclear Permissions, Privileges, and Access Controls Vulnerability (CVE-2011-5083)
WordPress Plugin Contact Form Email Cross-Site Scripting (1.3.24)
WordPress Plugin Thrive Quiz Builder Security Bypass (2.3.9.3)
WordPress Plugin Translate WordPress with GTranslate Cross-Site Scripting (2.8.51)