Description
WordPress Plugin Ajax Pagination (twitter Style) is prone to a local file inclusion vulnerability because it fails to sufficiently sanitize user-supplied input. Exploiting this issue may allow an attacker to obtain sensitive information that could aid in further attacks. WordPress Plugin Ajax Pagination (twitter Style) version 1.1 is vulnerable; prior versions may also be affected.
Remediation
Edit the source code to ensure that input is properly verified or disable the plugin until a fix is available
References
http://www.exploit-db.com/exploits/32622/
http://seclists.org/fulldisclosure/2014/Mar/398
http://packetstormsecurity.com/files/125929/Ajax-Pagination-1.1-Local-File-Inclusion.html
Related Vulnerabilities
Oracle Application Server CVE-2007-5520 Vulnerability (CVE-2007-5520)
WordPress Plugin Frontend File Manager Multiple Vulnerabilities (18.2)
WordPress Other Vulnerability (CVE-2006-5705)
Joomla! Core 3.x.x Information Disclosure (3.0.0 - 3.9.19)
Piwigo Improper Access Control Vulnerability (CVE-2016-10084)