Description
WordPress Plugin Simple File List is prone to a vulnerability that lets attackers download arbitrary files because the application fails to sufficiently verify user-supplied input. This may allow an attacker to gain access to sensitive information, which may aid in launching further attacks. WordPress Plugin Simple File List version 3.2.7 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 3.2.8 or latest
References
https://docs.google.com/document/d/1qIZXTzEpI4tO6832vk1KfsSAroT0FY2l--THlhJ8z3c/edit
https://www.wordfence.com/vulnerability-advisories/#CVE-2022-1119
https://plugins.svn.wordpress.org/simple-file-list/trunk/readme.txt
Related Vulnerabilities
Apache Tomcat Other Vulnerability (CVE-2003-0045)
RubyGems 7PK - Security Features Vulnerability (CVE-2015-3900)
OpenVPN AS Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2013-2061)
Moodle Permissions, Privileges, and Access Controls Vulnerability (CVE-2012-4401)
WordPress Plugin Stop User Enumeration User Enumeration (1.3.8)