Description
WordPress Plugin Zingiri Web Shop is prone to a remote file include vulnerability because it fails to sufficiently sanitize user-supplied input. Exploiting this issue could allow an attacker to compromise the application and the underlying system; other attacks are also possible. WordPress Plugin Zingiri Web Shop version 2.2.0 is vulnerable; other versions may also be affected.
Remediation
Update to plugin version 2.2.1 or latest
References
http://www.securityfocus.com/bid/49690/exploit
http://www.exploit-db.com/exploits/17867/
http://packetstormsecurity.com/files/view/105237/wpzingiri-rfi.txt
Related Vulnerabilities
PostgreSQL Improper Input Validation Vulnerability (CVE-2019-10210)
ZenCart Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2009-4322)
Moodle Improper Control of Generation of Code ('Code Injection') Vulnerability (CVE-2013-5674)
WordPress Plugin 1 Flash Gallery 'upload.php' Arbitrary File Upload (1.5.7)
WordPress Plugin Add Product Tabs for WooCommerce Security Bypass (1.4.2)