Description
WordPress Plugin WP-Lytebox is prone to a vulnerability which can be exploited by malicious people to disclose sensitive information. Input passed to the "pg" parameter in wp-lytebox/main.php is not properly verified before being used to include files. This can be exploited to include arbitrary files from local resources via directory traversal attacks. WordPress Plugin WP-Lytebox version 1.3 is vulnerable; other versions may also be affected.
Remediation
Edit the source code to ensure that input is properly verified or disable the plugin until a fix is available
References
http://www.f-secure.com/vulnerabilities/SA200902421
http://www.exploit-db.com/exploits/8791/
http://packetstormsecurity.com/files/view/77831/wplytebox-lfi.txt
Related Vulnerabilities
WordPress Plugin Blue Admin Cross-Site Request Forgery (21.06.01)
WordPress Plugin WP CleanFix Cross-Site Request Forgery (2.4.4)
WordPress Plugin Donations Privilege Escalation (1.3)
WordPress Plugin WP Glossary 'ajax.php' SQL Injection (0.1)
WordPress Plugin WOOCS-Currency Switcher for WooCommerce Professional Local File Inclusion (1.3.6.2)