Description
WordPress Plugin Flog is prone to a server-side request forgery vulnerability. An attacker may leverage this issue to make the vulnerable server perform port scanning of hosts in internal or external networks; other attacks are also possible. WordPress Plugin Flog version 1.0beta3 is vulnerable; prior versions may also be affected.
Remediation
Edit the source code to ensure that input is properly validated or disable the plugin until a fix is available
References
Related Vulnerabilities
Internet Information Services Improper Input Validation Vulnerability (CVE-2000-0258)
Atlassian Jira Other Vulnerability (CVE-2019-14997)
MySQL Numeric Errors Vulnerability (CVE-2006-3486)
WordPress Plugin Ajax Calendar 'example.php' Cross-Site Scripting (1.0)
MediaWiki Incorrect Default Permissions Vulnerability (CVE-2011-4361)