Description
WordPress Plugin A/B Test is prone to a directory traversal vulnerability because it fails to sufficiently sanitize user-supplied input. Exploiting this issue can allow an attacker to obtain sensitive information that could aid in further attacks. WordPress Plugin A/B Test version 1.0.6 is vulnerable; other versions may also be affected.
Remediation
Edit the source code to ensure that input is properly verified or disable the plugin until a fix is available
References
http://packetstormsecurity.com/files/117353/WordPress-Abtest-Directory-Traversal.html
https://www.exploit-db.com/exploits/39577/
https://packetstormsecurity.com/files/136309/WordPress-Abtest-Local-File-Inclusion.html
Related Vulnerabilities
WordPress Plugin WP-Stats Multiple Vulnerabilities (2.51)
OpenSSL Cryptographic Issues Vulnerability (CVE-2009-3555)
MySQL CVE-2022-21311 Vulnerability (CVE-2022-21311)
WordPress Plugin Multisite Post Duplicator Cross-Site Request Forgery (0.9.5.1)
WordPress Plugin WolfNet IDX for WordPress Multiple Unspecified Vulnerabilities (1.14.7)