Description
WordPress Plugin WP-Lytebox is prone to a vulnerability which can be exploited by malicious people to disclose sensitive information. Input passed to the "pg" parameter in wp-lytebox/main.php is not properly verified before being used to include files. This can be exploited to include arbitrary files from local resources via directory traversal attacks. WordPress Plugin WP-Lytebox version 1.3 is vulnerable; other versions may also be affected.
Remediation
Edit the source code to ensure that input is properly verified or disable the plugin until a fix is available
References
http://www.f-secure.com/vulnerabilities/SA200902421
http://www.exploit-db.com/exploits/8791/
http://packetstormsecurity.com/files/view/77831/wplytebox-lfi.txt
Related Vulnerabilities
Embed Swagger Cross-Site Scripting (1.0.0)
WordPress 5.2.x Multiple Vulnerabilities (5.2 - 5.2.9)
PHP Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2007-5899)
Site Reviews CSV Injection (6.2.0)
Swipe Checkout for WP e-Commerce Multiple Cross-Site Scripting Vulnerabilities (3.1.0)