Description
WordPress Plugin Really Simple Guest Post is prone to a local file inclusion vulnerability because it fails to sufficiently verify user-supplied input. Exploiting this issue may allow an attacker to obtain sensitive information that could aid in further attacks. WordPress Plugin Really Simple Guest Post version 1.0.6 is vulnerable; prior versions are also affected.
Remediation
Update to plugin version 1.0.7 or latest
References
Related Vulnerabilities
WordPress Plugin s2Member Framework 's2_invoice' Parameter Remote Security Bypass (111105)
WordPress Plugin O2Tweet Cross-Site Request Forgery (0.0.4)
WebLogic Loop with Unreachable Exit Condition ('Infinite Loop') Vulnerability (CVE-2018-1324)
PHP Other Vulnerability (CVE-2003-1302)
WordPress Plugin Locatoraid Store Locator Cross-Site Request Forgery (3.9.11)