Description
WordPress Plugin Spicy Blogroll is prone to a local file include vulnerability because it fails to sufficiently sanitize user-supplied input. An attacker can exploit this vulnerability to view files and execute local scripts in the context of the web server process; this may aid in launching further attacks. WordPress Plugin Spicy Blogroll version 1.0.0 is vulnerable; other versions may also be affected.
Remediation
Edit the source code to ensure that input is properly sanitised or disable the plugin until a fix is available
References
https://www.exploit-db.com/exploits/26804/
http://1337day.com/exploit/20994
http://packetstormsecurity.com/files/122396/WordPress-Spicy-Blogroll-Local-File-Inclusion.html
Related Vulnerabilities
WordPress Plugin Twitter Feed:Embedded Timeline 'url' Parameter Cross-Site Scripting (0.3.1)
MyBB Improper Input Validation Vulnerability (CVE-2016-9420)
WordPress Plugin Complete Gallery Manager for WordPress Arbitrary File Upload (3.3.3)
PHP Resource Management Errors Vulnerability (CVE-2015-8877)
Internet Information Services Other Vulnerability (CVE-2000-0114)