Absolute path traversal vulnerability in include/user/download.php in the Swim Team plugin 1.44.10777 for WordPress allows remote attackers to read arbitrary files via a full pathname in the file parameter.Referenceshttp://michaelwalsh.org/blog/2015/07/wp-swimteam-v1-45-beta-3-now-available/http://packetstormsecurity.com/files/132653/WordPress-WP-SwimTeam-1.44.10777-Arbitrary-File-Download.htmlhttps://wpvulndb.com/vulnerabilities/8071http://www.securityfocus.com/bid/75600http://www.vapid.dhs.org/advisory.php?v=134https://wordpress.org/support/topic/security-vulnerability-6