Description
WordPress Plugin Photocart Link is prone to a local file inclusion vulnerability because it fails to sufficiently verify user-supplied input. Exploiting this issue may allow an attacker to obtain sensitive information that could aid in further attacks. WordPress Plugin Photocart Link version 1.6 is vulnerable; prior versions may also be affected.
Remediation
Edit the source code to ensure that input is properly verified or disable the plugin until a fix is available
References
https://www.exploit-db.com/exploits/39623/
https://packetstormsecurity.com/files/136448/WordPress-Photocart-Link-1.6-Local-File-Inclusion.html
Related Vulnerabilities
WordPress Plugin Livemesh SiteOrigin Widgets Security Bypass (2.5.1)
WordPress Plugin Multilanguage by BestWebSoft Cross-Site Scripting (1.2.1)
WordPress Plugin Super Interactive Maps for WordPress SQL Injection (2.1)
WordPress Plugin Ad Blocker Notify Lite Cross-Site Scripting (2.4.0)
WordPress Plugin Spam protection, AntiSpam, FireWall by CleanTalk Cross-Site Scripting (5.127.3)