Absolute path traversal vulnerability in include/user/download.php in the Swim Team plugin 1.44.10777 for WordPress allows remote attackers to read arbitrary files via a full pathname in the file parameter.
michaelwalsh.org/blog/2015/07/wp-swimteam-v1-45-beta-3-now-available/
packetstormsecurity.com/files/132653/WordPress-WP-SwimTeam-1.44.10777-Arbitrary-File-Download.html
www.securityfocus.com/bid/75600
www.vapid.dhs.org/advisory.php?v=134
wordpress.org/support/topic/security-vulnerability-6
wpvulndb.com/vulnerabilities/8071