Description
WordPress Plugin MP3-jPlayer is prone to a local file disclosure vulnerability because it fails to adequately validate user-supplied input. Exploiting this vulnerability could allow an attacker to obtain potentially sensitive information from local files on computers running the vulnerable application; this may aid in further attacks. WordPress Plugin MP3-jPlayer version 2.3 is vulnerable; other versions may also be affected.
Remediation
Edit the source code to ensure that input is properly verified or disable the plugin until a fix is available
References
http://k3dsec.blogspot.ro/2015/03/wordpress-plugin-mp3-jplayer-v23-local.html
http://packetstormsecurity.com/files/130956/WordPress-MP3-Jplayer-2.1-Local-File-Disclosure.html
Related Vulnerabilities
Joomla! Core 1.5.x Cross-Site Scripting (1.5.0 - 1.5.10)
WordPress Plugin Abandoned Cart Lite for WooCommerce Cross-Site Scripting (5.1.3)
WordPress Plugin Ivory Search-WordPress Search Cross-Site Scripting (4.6.6)
Drupal Core Security Bypass (8.0.0 - 9.1.15)
WordPress Plugin Ceceppa Multilingua Multiple Cross-Site Scripting Vulnerabilities (1.5.13)