2 results (0.003 seconds)

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

The File Manager WordPress plugin before 6.3 does not restrict the file managers root directory, allowing an administrator to set a root outside of the WordPress root directory, giving access to system files and directories even in a multisite setup, where site administrators should not be allowed to modify the sites files. El complemento File Manager de WordPress anterior a 6.3 no restringe el directorio raíz de los administradores de archivos, lo que permite a un administrador establecer una raíz fuera del directorio raíz de WordPress, brindando acceso a archivos y directorios del sistema incluso en una configuración de múltiples sitios, donde los administradores de sitios no deberían tener permiso para modificar los archivos del sitio. The File Manager – 100% Free & Open Source File Manager Plugin for WordPress | Bit File Manager plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 6.2 via the Root Folder Path setting. This makes it possible for authenticated attackers, with administrative-level access and above, to read the contents of arbitrary files on the server (past the root WordPress instance), which can contain sensitive information. • https://wpscan.com/vulnerability/f250226f-4a05-4d75-93c4-5444a4ce919e • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-552: Files or Directories Accessible to External Parties •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

Deserialization of Untrusted Data vulnerability in File Manager by Bit Form Team File Manager – 100% Free & Open Source File Manager Plugin for WordPress | Bit File Manager.This issue affects File Manager – 100% Free & Open Source File Manager Plugin for WordPress | Bit File Manager: from n/a through 5.2.7. Vulnerabilidad de deserialización de datos no confiables en File Manager by Bit Form Team File Manager – 100% Free & Open Source File Manager complemento para Wordpress | Bit File Manager. Este problema afecta a File Manager – 100% Free & Open Source File Manager complemento para Wordpress | Bit File Manager : desde n/a hasta 5.2.7. The Bit File Manager plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 5.2.7 via deserialization of untrusted input from the 'language' setting parameter. This allows authenticated attackers, with administrative privileges and above, to inject a PHP Object. • https://patchstack.com/database/vulnerability/file-manager/wordpress-bit-file-manager-100-free-file-manager-for-wordpress-plugin-5-2-7-php-object-injection?_s_id=cve • CWE-502: Deserialization of Untrusted Data •