Description
WordPress Plugin Zingiri Web Shop is prone to a remote file include vulnerability because it fails to sufficiently sanitize user-supplied input. Exploiting this issue could allow an attacker to compromise the application and the underlying system; other attacks are also possible. WordPress Plugin Zingiri Web Shop version 2.2.0 is vulnerable; other versions may also be affected.
Remediation
Update to plugin version 2.2.1 or latest
References
http://www.securityfocus.com/bid/49690/exploit
http://www.exploit-db.com/exploits/17867/
http://packetstormsecurity.com/files/view/105237/wpzingiri-rfi.txt
Related Vulnerabilities
WordPress Plugin DandyID Services Cross-Site Request Forgery (1.5.9)
phpMyAdmin Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-8669)
Drupal Core 8.9.x Directory Traversal (8.9.0 - 8.9.16)
WordPress Plugin wp-football Multiple Cross-Site Scripting Vulnerabilities (1.1)
WordPress Plugin WassUp Real Time Analytics Cross-Site Scripting (1.9)