
CVE-2024-2654 – File Manager <= 7.2.5 - Authenticated (Administrator+) Directory Traversal
https://notcve.org/view.php?id=CVE-2024-2654
03 Apr 2024 — The File Manager plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 7.2.5 via the fm_download_backup function. This makes it possible for authenticated attackers, with administrator access and above, to read the contents of arbitrary zip files on the server, which can contain sensitive information. El complemento File Manager para WordPress es vulnerable a Directory Traversal en todas las versiones hasta la 7.2.5 incluida a través de la función fm_download_backup... • https://plugins.trac.wordpress.org/browser/wp-file-manager/trunk/file_folder_manager.php#L1353 • CWE-35: Path Traversal: '.../ •

CVE-2024-1538 – File Manager <= 7.2.4 - Cross-Site Request Forgery to Local JS File Inclusion
https://notcve.org/view.php?id=CVE-2024-1538
20 Mar 2024 — The File Manager plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 7.2.4. This is due to missing or incorrect nonce validation on the wp_file_manager page that includes files through the 'lang' parameter. This makes it possible for unauthenticated attackers to include local JavaScript files that can be leveraged to achieve RCE via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. This issue ... • https://plugins.trac.wordpress.org/changeset/3051451/wp-file-manager • CWE-352: Cross-Site Request Forgery (CSRF) •

CVE-2023-6825 – File Manager And File Manager Pro (Multiple Versions) - Directory Traversal
https://notcve.org/view.php?id=CVE-2023-6825
04 Mar 2024 — The File Manager and File Manager Pro plugins for WordPress are vulnerable to Directory Traversal in versions up to, and including version 7.2.1 (free version) and 8.3.4 (Pro version) via the target parameter in the mk_file_folder_manager_action_callback_shortcode function. This makes it possible for attackers to read the contents of arbitrary files on the server, which can contain sensitive information and to upload files into directories other than the intended directory for file uploads. The free version... • https://github.com/Studio-42/elFinder/blob/master/php/elFinderVolumeDriver.class.php#L6784 • CWE-23: Relative Path Traversal •

CVE-2024-0761 – File Manager <= 7.2.1 - Sensitive Information Exposure via Backup Filenames
https://notcve.org/view.php?id=CVE-2024-0761
22 Jan 2024 — The File Manager plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 7.2.1 due to insufficient randomness in the backup filenames, which use a timestamp plus 4 random digits. This makes it possible for unauthenticated attackers, to extract sensitive data including site backups in configurations where the .htaccess file in the directory does not block access. El complemento File Manager para WordPress es vulnerable a la exposición de información confiden... • https://plugins.trac.wordpress.org/changeset/3023403/wp-file-manager/trunk/file_folder_manager.php?old=2984933&old_path=wp-file-manager%2Ftrunk%2Ffile_folder_manager.php • CWE-330: Use of Insufficiently Random Values •

CVE-2023-5907 – File Manager < 6.3 - Admin+ Arbitrary OS File/Folder Access + Path Traversal
https://notcve.org/view.php?id=CVE-2023-5907
20 Nov 2023 — The File Manager WordPress plugin before 6.3 does not restrict the file managers root directory, allowing an administrator to set a root outside of the WordPress root directory, giving access to system files and directories even in a multisite setup, where site administrators should not be allowed to modify the sites files. El complemento File Manager de WordPress anterior a 6.3 no restringe el directorio raíz de los administradores de archivos, lo que permite a un administrador establecer una raíz fuera de... • https://wpscan.com/vulnerability/f250226f-4a05-4d75-93c4-5444a4ce919e • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') CWE-552: Files or Directories Accessible to External Parties •

CVE-2022-47599 – WordPress File Manager Plugin <= 5.2.7 is vulnerable to PHP Object Injection
https://notcve.org/view.php?id=CVE-2022-47599
28 Apr 2023 — Deserialization of Untrusted Data vulnerability in File Manager by Bit Form Team File Manager – 100% Free & Open Source File Manager Plugin for WordPress | Bit File Manager.This issue affects File Manager – 100% Free & Open Source File Manager Plugin for WordPress | Bit File Manager: from n/a through 5.2.7. Vulnerabilidad de deserialización de datos no confiables en File Manager by Bit Form Team File Manager – 100% Free & Open Source File Manager complemento para Wordpress | Bit File Manager. Este probl... • https://patchstack.com/database/vulnerability/file-manager/wordpress-bit-file-manager-100-free-file-manager-for-wordpress-plugin-5-2-7-php-object-injection?_s_id=cve • CWE-502: Deserialization of Untrusted Data •

CVE-2018-25030 – Mirmay Secure Private Browser / File Manager Auto Lock improper authentication
https://notcve.org/view.php?id=CVE-2018-25030
28 Mar 2022 — A vulnerability classified as problematic has been found in Mirmay Secure Private Browser and File Manager up to 2.5. Affected is the Auto Lock. A race condition leads to a local authentication bypass. The exploit has been disclosed to the public and may be used. Se ha encontrado una vulnerabilidad clasificada como problemática en Mirmay Secure Private Browser y File Manager versiones hasta 2.5. • https://vuldb.com/?id.106056 • CWE-287: Improper Authentication CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') •

CVE-2021-24177 – WP File Manager < 7.1 - Reflected Cross-Site Scripting (XSS)
https://notcve.org/view.php?id=CVE-2021-24177
26 Feb 2021 — In the default configuration of the File Manager WordPress plugin before 7.1, a Reflected XSS can occur on the endpoint /wp-admin/admin.php?page=wp_file_manager_properties when a payload is submitted on the User-Agent parameter. The payload is then reflected back on the web application response. En la configuración predeterminada del plugin de WordPress File Manager versiones anteriores a 7.1, un ataque de tipo XSS reflejado puede ocurrir en el endpoint /wp-admin/admin.php?page=wp_file_manager_properties cu... • https://n4nj0.github.io/advisories/wordpress-plugin-wp-file-manager-i • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2020-25213 – WordPress File Manager Plugin Remote Code Execution Vulnerability
https://notcve.org/view.php?id=CVE-2020-25213
01 Sep 2020 — The File Manager (wp-file-manager) plugin before 6.9 for WordPress allows remote attackers to upload and execute arbitrary PHP code because it renames an unsafe example elFinder connector file to have the .php extension. This, for example, allows attackers to run the elFinder upload (or mkfile and put) command to write PHP code into the wp-content/plugins/wp-file-manager/lib/files/ directory. This was exploited in the wild in August and September 2020. El complemento File Manager (wp-file-manager) versiones... • https://packetstorm.news/files/id/171650 • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVE-2020-24312 – WP File Manager <= 6.4 - Unauthenticated Resource Access to Site Backups
https://notcve.org/view.php?id=CVE-2020-24312
13 Aug 2020 — mndpsingh287 WP File Manager v6.4 and lower fails to restrict external access to the fm_backups directory with a .htaccess file. This results in the ability for unauthenticated users to browse and download any site backups, which sometimes include full database backups, that the plugin has taken. mndpsingh287 WP File Manager versiones v6.4 y anteriores, no restringen el acceso externo al directorio fm_backups con un archivo .htaccess. Esto resulta en la posibilidad para unos usuarios no autenticados de exam... • https://zeroaptitude.com/zerodetail/wordpress-plugin-bug-hunting-part-1 • CWE-552: Files or Directories Accessible to External Parties •