Description
WordPress Plugin Subscribe to Comments is prone to a local file inclusion vulnerability because it fails to sufficiently verify user-supplied input. Exploiting this issue may allow an attacker to obtain sensitive information that could aid in further attacks. WordPress Plugin Subscribe to Comments version 2.1.2 is vulnerable; prior versions are also affected.
Remediation
Update to plugin version 2.3 or latest
References
Related Vulnerabilities
WordPress Plugin Zoho Marketing Automation SQL Injection (1.2.7)
Joomla! Core 2.5.x Security Bypass (2.5.0 - 2.5.24)
WordPress Plugin The Official Facebook Chat Security Bypass (1.5)
WordPress Plugin All-in-One Event Calendar Multiple Vulnerabilities (1.9)
Moodle Improper Following of Specification by Caller Vulnerability (CVE-2019-14829)