Description
WordPress Plugin Wechat Broadcast is prone to a local/remote file inclusion vulnerability because it fails to sufficiently verify user-supplied input. Exploiting this issue may allow an attacker to obtain sensitive information that could aid in further attacks or to include arbitrary remote files containing malicious PHP code and execute it in the context of the webserver process, thus compromising the application and gaining access to the underlying system. WordPress Plugin Wechat Broadcast version 1.2.0 is vulnerable; prior versions may also be affected.
Remediation
Edit the source code to ensure that input is properly verified or disable the plugin until a fix is available
References
Related Vulnerabilities
WordPress Plugin Coming Soon Page & Maintenance Mode Unspecified Vulnerability (1.8.2)
WordPress 2.3.3 Directory Traversal Vulnerability (0.6.2 - 2.3.3)
WordPress Plugin Social Sharing-Sassy Social Share PHP Object Injection (3.3.23)
WordPress Plugin Backup and Staging by WP Time Capsule PHP Object Injection (1.21.9)
WordPress Plugin MailPoet Newsletters (Previous) Cross-Site Scripting (2.6.11)