Description
WordPress Plugin Image Export is prone to a vulnerability that lets attackers download arbitrary files because the application fails to sufficiently verify user-supplied input. This may allow an attacker to gain access to sensitive information, which may aid in launching further attacks. WordPress Plugin Image Export version 1.1.0 is vulnerable.
Remediation
Edit the source code to ensure that input is properly verified or disable the plugin until a fix is available
References
http://www.vapidlabs.com/advisory.php?v=135
http://seclists.org/fulldisclosure/2015/Jul/65
http://www.openwall.com/lists/oss-security/2015/07/13/10
https://packetstormsecurity.com/files/132688/WordPress-Image-Export-1.1-Arbitrary-File-Download.html
Related Vulnerabilities
Oracle Database Server CVE-2012-0511 Vulnerability (CVE-2012-0511)
WordPress Plugin WordPress OpenID Connect Client Cross-Site Scripting (2.1.4)
WordPress Plugin Sexy Add Template Cross-Site Request Forgery (1.0)
WordPress Plugin GiveWP-Donation and Fundraising Platform Cross-Site Scripting (2.3.0)
Zope Web Application Server Other Vulnerability (CVE-2010-3198)