Hello,
1. Arbitrary file read
Unauthenticated attackers can read arbitrary files.
Method: GET
Vulnerable parameters: filepath, filename
Example PHP callstack:
multi-plugin-installer/mpi_download.php:117
mpi_download_file [/multi-plugin-installer/mpi_download.php:88]
Verification (download wp-config.php):
--
Regards,
Marcin Probola,