Description
WordPress Plugin Photocart Link is prone to a local file inclusion vulnerability because it fails to sufficiently verify user-supplied input. Exploiting this issue may allow an attacker to obtain sensitive information that could aid in further attacks. WordPress Plugin Photocart Link version 1.6 is vulnerable; prior versions may also be affected.
Remediation
Edit the source code to ensure that input is properly verified or disable the plugin until a fix is available
References
https://www.exploit-db.com/exploits/39623/
https://packetstormsecurity.com/files/136448/WordPress-Photocart-Link-1.6-Local-File-Inclusion.html
Related Vulnerabilities
WordPress Plugin Slideshow Gallery LITE Multiple Vulnerabilities (1.5.3)
WordPress Plugin FormCraft-Contact Form Builder SQL Injection (1.0.5)
WordPress Plugin wpDataTables-Tables & Table Charts Premium SQL Injection (3.4)
Joomla! Core Information Disclosure (1.5.0 - 3.8.1)
WordPress Plugin Responsive Lightbox2 Cross-Site Scripting (1.0.2)