Description
WordPress Plugin WP with Spritz is prone to a local/remote file inclusion vulnerability because it fails to sufficiently verify user-supplied input. Exploiting this issue may allow an attacker to obtain sensitive information that could aid in further attacks or to include arbitrary remote files containing malicious PHP code and execute it in the context of the webserver process, thus compromising the application and gaining access to the underlying system. WordPress Plugin WP with Spritz version 1.0 is vulnerable.
Remediation
Edit the source code to ensure that input is properly verified or disable the plugin until a fix is available
References
https://www.exploit-db.com/exploits/44544/
https://packetstormsecurity.com/files/147376/WordPress-WP-With-Spritz-1.0-File-Inclusion.html
Related Vulnerabilities
WordPress Plugin WordPress for Google Maps-WP MAPS Cross-Site Scripting (4.0.4)
WordPress Plugin Foliopress WYSIWYG Cross-Site Scripting (2.6.8.4)
WordPress 4.3.x Multiple Vulnerabilities (4.3 - 4.3.28)
WordPress Plugin UpdraftPlus WordPress Backup Security Bypass (1.22.1)
WordPress Plugin The Events Calendar Countdown Addon Security Bypass (1.3.1)