Description
WordPress Plugin WP with Spritz is prone to a local/remote file inclusion vulnerability because it fails to sufficiently verify user-supplied input. Exploiting this issue may allow an attacker to obtain sensitive information that could aid in further attacks or to include arbitrary remote files containing malicious PHP code and execute it in the context of the webserver process, thus compromising the application and gaining access to the underlying system. WordPress Plugin WP with Spritz version 1.0 is vulnerable.
Remediation
Edit the source code to ensure that input is properly verified or disable the plugin until a fix is available
References
https://www.exploit-db.com/exploits/44544/
https://packetstormsecurity.com/files/147376/WordPress-WP-With-Spritz-1.0-File-Inclusion.html
Related Vulnerabilities
Drupal Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2016-6212)
Plone CMS Improper Input Validation Vulnerability (CVE-2011-4462)
WordPress Plugin Duplicator-WordPress Migration Cross-Site Scripting (1.2.28)
Internet Information Services Other Vulnerability (CVE-1999-0412)