Description
WordPress Plugin Ajax Pagination (twitter Style) is prone to a local file inclusion vulnerability because it fails to sufficiently sanitize user-supplied input. Exploiting this issue may allow an attacker to obtain sensitive information that could aid in further attacks. WordPress Plugin Ajax Pagination (twitter Style) version 1.1 is vulnerable; prior versions may also be affected.
Remediation
Edit the source code to ensure that input is properly verified or disable the plugin until a fix is available
References
http://www.exploit-db.com/exploits/32622/
http://seclists.org/fulldisclosure/2014/Mar/398
http://packetstormsecurity.com/files/125929/Ajax-Pagination-1.1-Local-File-Inclusion.html
Related Vulnerabilities
WordPress Plugin Profile Builder-User Profile & User Registration Forms Cross-Site Scripting (3.6.1)
WordPress Plugin Verve Meta Boxes TimThumb Arbitrary File Upload (1.2.8)
MySQL CVE-2013-5786 Vulnerability (CVE-2013-5786)
WordPress 3.9.x Multiple Vulnerabilities (3.9 - 3.9.30)
WordPress Plugin WOOF-Products Filter for WooCommerce Unspecified Vulnerability (1.2.6.2)