Description
WordPress Plugin U Extended Comment is prone to a vulnerability that lets attackers download arbitrary files because the application fails to sufficiently verify user-supplied input. An attacker can exploit this issue to gain access to sensitive information which may lead to other attacks. Successful exploitation requires "Attachment" permissions. WordPress Plugin U Extended Comment version 1.0.1 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 1.0.2 or latest
References
Related Vulnerabilities
MySQL CVE-2015-2639 Vulnerability (CVE-2015-2639)
MySQL CVE-2020-2770 Vulnerability (CVE-2020-2770)
XWiki Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2023-50723)
WordPress Plugin Front-end Editor 'upload.php' Arbitrary File Upload (2.2.1)
WordPress Plugin MailChimp List Subscribe Form Multiple Unspecified Vulnerabilities (1.1)