Description
WordPress Plugin Spicy Blogroll is prone to a local file include vulnerability because it fails to sufficiently sanitize user-supplied input. An attacker can exploit this vulnerability to view files and execute local scripts in the context of the web server process; this may aid in launching further attacks. WordPress Plugin Spicy Blogroll version 1.0.0 is vulnerable; other versions may also be affected.
Remediation
Edit the source code to ensure that input is properly sanitised or disable the plugin until a fix is available
References
https://www.exploit-db.com/exploits/26804/
http://1337day.com/exploit/20994
http://packetstormsecurity.com/files/122396/WordPress-Spicy-Blogroll-Local-File-Inclusion.html
Related Vulnerabilities
IBM RTC Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2018-1423)
WordPress Plugin Data Tables Generator by Supsystic Multiple Vulnerabilities (1.9.96)
PrestaShop Incorrect Authorization Vulnerability (CVE-2020-5287)
WordPress Plugin MapPress Maps for WordPress Security Bypass (2.54.5)