The Quick Playground plugin for WordPress is vulnerable to Path Traversal in versions up to and including 1.3.3. This is due to insufficient path validation in the qckply_zip_theme() function, which appends a user-controlled 'stylesheet' parameter directly to the theme root directory path without sanitizing directory traversal sequences. This makes it possible for unauthenticated attackers to trigger the creation of a ZIP archive containing arbitrary files from the server's filesystem — including wp-config.
https://plugins.trac.wordpress.org/browser/quick-playground/trunk/utility.php#L248
https://plugins.trac.wordpress.org/browser/quick-playground/trunk/utility.php#L162
https://plugins.trac.wordpress.org/browser/quick-playground/trunk/api.php#L631
https://plugins.trac.wordpress.org/browser/quick-playground/trunk/api.php#L62
https://plugins.trac.wordpress.org/browser/quick-playground/tags/1.3.1/utility.php#L248
https://plugins.trac.wordpress.org/browser/quick-playground/tags/1.3.1/utility.php#L162
https://plugins.trac.wordpress.org/browser/quick-playground/tags/1.3.1/api.php#L631
https://plugins.trac.wordpress.org/browser/quick-playground/tags/1.3.1/api.php#L62