Description
WordPress Plugin Image Export is prone to a vulnerability that lets attackers download arbitrary files because the application fails to sufficiently verify user-supplied input. This may allow an attacker to gain access to sensitive information, which may aid in launching further attacks. WordPress Plugin Image Export version 1.1.0 is vulnerable.
Remediation
Edit the source code to ensure that input is properly verified or disable the plugin until a fix is available
References
http://www.vapidlabs.com/advisory.php?v=135
http://seclists.org/fulldisclosure/2015/Jul/65
http://www.openwall.com/lists/oss-security/2015/07/13/10
https://packetstormsecurity.com/files/132688/WordPress-Image-Export-1.1-Arbitrary-File-Download.html
Related Vulnerabilities
Oracle Database Server CVE-2014-4300 Vulnerability (CVE-2014-4300)
WordPress Plugin WP-Paginate Cross-Site Scripting (2.1.3)
WordPress Plugin SVG Support Cross-Site Scripting (2.4.2)
WordPress Plugin Contact Form 7-Clockwork SMS Cross-Site Scripting (2.3.0)
SharePoint Out-of-bounds Write Vulnerability (CVE-2014-1761)