Description
WordPress Plugin Spicy Blogroll is prone to a local file include vulnerability because it fails to sufficiently sanitize user-supplied input. An attacker can exploit this vulnerability to view files and execute local scripts in the context of the web server process; this may aid in launching further attacks. WordPress Plugin Spicy Blogroll version 1.0.0 is vulnerable; other versions may also be affected.
Remediation
Edit the source code to ensure that input is properly sanitised or disable the plugin until a fix is available
References
https://www.exploit-db.com/exploits/26804/
http://1337day.com/exploit/20994
http://packetstormsecurity.com/files/122396/WordPress-Spicy-Blogroll-Local-File-Inclusion.html
Related Vulnerabilities
WordPress Plugin Woocommerce Product Designer Arbitrary File Upload (3.0.3)
WordPress Plugin WP fail2ban Security Bypass (4.0.2)
WordPress 5.4.x Multiple Vulnerabilities (5.4 - 5.4.11)
WordPress Plugin WordPress Gallery Cross-Site Scripting (1.0)
WordPress Plugin Smart Slideshow Arbitrary File Upload (2.4)