Description
WordPress Plugin WP with Spritz is prone to a local/remote file inclusion vulnerability because it fails to sufficiently verify user-supplied input. Exploiting this issue may allow an attacker to obtain sensitive information that could aid in further attacks or to include arbitrary remote files containing malicious PHP code and execute it in the context of the webserver process, thus compromising the application and gaining access to the underlying system. WordPress Plugin WP with Spritz version 1.0 is vulnerable.
Remediation
Edit the source code to ensure that input is properly verified or disable the plugin until a fix is available
References
https://www.exploit-db.com/exploits/44544/
https://packetstormsecurity.com/files/147376/WordPress-WP-With-Spritz-1.0-File-Inclusion.html
Related Vulnerabilities
WordPress Plugin AJS Instagram Feed Cross-Site Scripting (1.0)
WordPress Plugin Elementor Website Builder Security Bypass (3.0.13)
WordPress Plugin Two-Factor Authentication-Clockwork SMS Cross-Site Scripting (1.0.3)
WordPress Plugin Share Buttons by AddThis Cross-Site Scripting (4.0.7)
WordPress Plugin Codestyling Localization Multiple Vulnerabilities (1.99.30)