Description
WordPress Plugin Kish Guest Posting is prone to a vulnerability that lets attackers upload arbitrary files because the application fails to adequately sanitize user-supplied input. An attacker may leverage this issue to upload arbitrary files to the affected computer; this can result in arbitrary code execution within the context of the vulnerable application. WordPress Plugin Kish Guest Posting version 1.2 is vulnerable; other versions may also be affected.
Remediation
Restrict access to wp-content/plugins/kish-guest-posting/uploadify/scripts/uploadify.php (e.g. via .htaccess) or disable the plugin until a fix is available
References
http://www.securityfocus.com/bid/51638/exploit
http://www.exploit-db.com/exploits/18412/
http://packetstormsecurity.com/files/109015/wpkishguestposting-shell.txt
Related Vulnerabilities
WordPress Plugin Newsletter-Send awesome emails from WordPress Cross-Site Scripting (4.6.0)
WordPress Plugin YITH WooCommerce Product Add-Ons Multiple Vulnerabilities (2.0.7)
WordPress Plugin Table Maker Multiple Vulnerabilities (1.7)
WordPress Plugin Active Directory Integration SQL Injection (1.1.8)