Description
WordPress Plugin Ghost is prone to a vulnerability that lets attackers download arbitrary files because the application fails to sufficiently verify user-supplied input. This may allow an attacker to gain access to sensitive information, which may aid in launching further attacks. WordPress Plugin Ghost version 0.5.5 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 0.5.6 or latest
References
https://www.exploit-db.com/exploits/39752/
https://packetstormsecurity.com/files/136887/WordPress-Export-To-Ghost-Export-Download.html
Related Vulnerabilities
Jetty Integer Overflow or Wraparound Vulnerability (CVE-2023-36478)
WordPress Plugin Font Awesome Information Disclosure (4.0.0-rc16)
PostgreSQL Time-of-check Time-of-use (TOCTOU) Race Condition Vulnerability (CVE-2024-7348)
WordPress Plugin Content Blocks (Custom Post Widget) Local File Inclusion (3.3.0)
Moodle Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-6100)