2 results (0.009 seconds)

CVSS: 6.6EPSS: 0%CPEs: 1EXPL: 1

The Advanced File Manager WordPress plugin before 5.1.1 does not adequately authorize its usage on multisite installations, allowing site admin users to list and read arbitrary files and folders on the server. El complemento de WordPress Advanced File Manager anterior a 5.1.1 no autoriza adecuadamente su uso en instalaciones multisitio, lo que permite a los usuarios administradores del sitio enumerar y leer archivos y carpetas arbitrarios en el servidor. The Advanced File Managerplugin for WordPress is vulnerable to improper access control in versions up to, and including, 5.1. This makes it possible for authenticated attackers, with administrator-level permissions and above, to access the filesystem on multisite installations. This only affects multi-site installations. • https://wpscan.com/vulnerability/ca954ec6-6ebd-4d72-a323-570474e2e339 • CWE-284: Improper Access Control CWE-863: Incorrect Authorization •

CVSS: 9.8EPSS: 36%CPEs: 1EXPL: 3

The File Manager Advanced Shortcode WordPress plugin through 2.3.2 does not adequately prevent uploading files with disallowed MIME types when using the shortcode. This leads to RCE in cases where the allowed MIME type list does not include PHP files. In the worst case, this is available to unauthenticated users. The File Manager Advanced Shortcode WordPress plugin for WordPress is vulnerable to remote code execution in versions up to, and including, 2.3.2. This is due to the plugin allowing users to upload PHP files when the shortcode has been added to a page/post. • https://www.exploit-db.com/exploits/51505 http://packetstormsecurity.com/files/173735/WordPress-File-Manager-Advanced-Shortcode-2.3.2-Remote-Code-Execution.html https://wpscan.com/vulnerability/58f72953-56d2-4d86-a49b-311b5fc58056 https://attackerkb.com/topics/JncRCWZ5xm/cve-2023-2068 • CWE-94: Improper Control of Generation of Code ('Code Injection') •