Description
WordPress Plugin Really Simple Guest Post is prone to a local file inclusion vulnerability because it fails to sufficiently verify user-supplied input. Exploiting this issue may allow an attacker to obtain sensitive information that could aid in further attacks. WordPress Plugin Really Simple Guest Post version 1.0.6 is vulnerable; prior versions are also affected.
Remediation
Update to plugin version 1.0.7 or latest
References
Related Vulnerabilities
WordPress Plugin Aspose DOC Exporter Arbitrary File Download (1.0)
Apache HTTP Server Resource Management Errors Vulnerability (CVE-2014-0231)
WordPress Plugin GNU-Mailman Integration Cross-Site Scripting (1.0.6)
WordPress 5.7.x Directory Traversal (5.7 - 5.7.11)
MediaWiki Cross-Site Request Forgery (CSRF) Vulnerability (CVE-2019-12466)