Description
WordPress Plugin Photocart Link is prone to a local file inclusion vulnerability because it fails to sufficiently verify user-supplied input. Exploiting this issue may allow an attacker to obtain sensitive information that could aid in further attacks. WordPress Plugin Photocart Link version 1.6 is vulnerable; prior versions may also be affected.
Remediation
Edit the source code to ensure that input is properly verified or disable the plugin until a fix is available
References
https://www.exploit-db.com/exploits/39623/
https://packetstormsecurity.com/files/136448/WordPress-Photocart-Link-1.6-Local-File-Inclusion.html
Related Vulnerabilities
WordPress Plugin Media File Renamer-Auto & Manual Rename Cross-Site Request Forgery (5.2.5)
WordPress Plugin Photoracer 'id' Parameter SQL Injection (1.0)
WordPress Plugin WP Mobile Detector Arbitrary File Upload (3.5)
WordPress Cross-Site Scripting Vulnerability (3.9.3 - 4.2)
WordPress Plugin WP Activity Log Cross-Site Request Forgery (4.1.3.2)