
CVE-2022-2440 – Theme Editor <= 2.8 - Authenticated (Admin+) PHAR Deserialization
https://notcve.org/view.php?id=CVE-2022-2440
28 Aug 2024 — The Theme Editor plugin for WordPress is vulnerable to deserialization of untrusted input via the 'images_array' parameter in versions up to, and including 2.8. This makes it possible for authenticated attackers with administrative privileges to call files using a PHAR wrapper that will deserialize and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the seriali... • https://plugins.trac.wordpress.org/browser/theme-editor/trunk/ms_child_theme_editor.php#L495 • CWE-502: Deserialization of Untrusted Data •

CVE-2024-2654 – File Manager <= 7.2.5 - Authenticated (Administrator+) Directory Traversal
https://notcve.org/view.php?id=CVE-2024-2654
03 Apr 2024 — The File Manager plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 7.2.5 via the fm_download_backup function. This makes it possible for authenticated attackers, with administrator access and above, to read the contents of arbitrary zip files on the server, which can contain sensitive information. El complemento File Manager para WordPress es vulnerable a Directory Traversal en todas las versiones hasta la 7.2.5 incluida a través de la función fm_download_backup... • https://plugins.trac.wordpress.org/browser/wp-file-manager/trunk/file_folder_manager.php#L1353 • CWE-35: Path Traversal: '.../ •

CVE-2024-1538 – File Manager <= 7.2.4 - Cross-Site Request Forgery to Local JS File Inclusion
https://notcve.org/view.php?id=CVE-2024-1538
20 Mar 2024 — The File Manager plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 7.2.4. This is due to missing or incorrect nonce validation on the wp_file_manager page that includes files through the 'lang' parameter. This makes it possible for unauthenticated attackers to include local JavaScript files that can be leveraged to achieve RCE via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. This issue ... • https://plugins.trac.wordpress.org/changeset/3051451/wp-file-manager • CWE-352: Cross-Site Request Forgery (CSRF) •

CVE-2023-6825 – File Manager And File Manager Pro (Multiple Versions) - Directory Traversal
https://notcve.org/view.php?id=CVE-2023-6825
04 Mar 2024 — The File Manager and File Manager Pro plugins for WordPress are vulnerable to Directory Traversal in versions up to, and including version 7.2.1 (free version) and 8.3.4 (Pro version) via the target parameter in the mk_file_folder_manager_action_callback_shortcode function. This makes it possible for attackers to read the contents of arbitrary files on the server, which can contain sensitive information and to upload files into directories other than the intended directory for file uploads. The free version... • https://github.com/Studio-42/elFinder/blob/master/php/elFinderVolumeDriver.class.php#L6784 • CWE-23: Relative Path Traversal •

CVE-2018-25105 – File Manager <= 3.0 - Unauthenticated Arbitrary File Upload/Download
https://notcve.org/view.php?id=CVE-2018-25105
17 Sep 2018 — The File Manager plugin for WordPress is vulnerable to authorization bypass due to a missing capability check in the /inc/root.php file in versions up to, and including, 3.0. This makes it possible for unauthenticated attackers to download arbitrary files from the server and upload arbitrary files that can be used for remote code execution. • https://www.wordfence.com/threat-intel/vulnerabilities/id/a56d5a2f-ae13-4523-bc4a-17bb2fb4c6f0?source=cve • CWE-862: Missing Authorization •