Description
WordPress Plugin Wechat Broadcast is prone to a local/remote file inclusion vulnerability because it fails to sufficiently verify user-supplied input. Exploiting this issue may allow an attacker to obtain sensitive information that could aid in further attacks or to include arbitrary remote files containing malicious PHP code and execute it in the context of the webserver process, thus compromising the application and gaining access to the underlying system. WordPress Plugin Wechat Broadcast version 1.2.0 is vulnerable; prior versions may also be affected.
Remediation
Edit the source code to ensure that input is properly verified or disable the plugin until a fix is available
References
Related Vulnerabilities
WordPress Plugin Store Locator for WordPress with Google Maps-LotsOfLocales SQL Injection (3.33.1)
Internet Information Services Other Vulnerability (CVE-1999-0738)
PHP Improper Input Validation Vulnerability (CVE-2015-4604)
WordPress Plugin Sidekick Multiple Unspecified Vulnerabilities (2.2.1)
WordPress Plugin Elementor Website Builder Multiple Cross-Site Scripting Vulnerabilities (3.1.1)