Description
WordPress Plugin Image Export is prone to a vulnerability that lets attackers download arbitrary files because the application fails to sufficiently verify user-supplied input. This may allow an attacker to gain access to sensitive information, which may aid in launching further attacks. WordPress Plugin Image Export version 1.1.0 is vulnerable.
Remediation
Edit the source code to ensure that input is properly verified or disable the plugin until a fix is available
References
http://www.vapidlabs.com/advisory.php?v=135
http://seclists.org/fulldisclosure/2015/Jul/65
http://www.openwall.com/lists/oss-security/2015/07/13/10
https://packetstormsecurity.com/files/132688/WordPress-Image-Export-1.1-Arbitrary-File-Download.html
Related Vulnerabilities
WordPress Plugin Subscribe Form Remote Command Execution (1.1)
WordPress Plugin Simple Download Monitor Multiple Vulnerabilities (3.8.8)
ownCloud Permissions, Privileges, and Access Controls Vulnerability (CVE-2016-5876)
SugarCRM Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2019-17303)
WordPress Plugin Easy Image Gallery Cross-Site Scripting (1.1.1)