12 results (0.006 seconds)

CVSS: 9.1EPSS: 0%CPEs: 1EXPL: 1

The Frontend File Manager Plugin WordPress plugin before 22.6 has a vulnerability that allows an Editor+ user to bypass the file download logic and download files such as `wp-config.php` El complemento Frontend File Manager Plugin de WordPress anterior a 22.6 tiene una vulnerabilidad que permite a un usuario de Editor+ omitir la lógica de descarga de archivos y descargar archivos como `wp-config.php`. The Frontend File Manager Plugin plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 22.5. This makes it possible for authenticated attackers, with editor access and above, to read the contents of arbitrary files on the server, which can contain sensitive information. • https://wpscan.com/vulnerability/d40c7108-bad6-4ed3-8539-35c0f57e62cc • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

The Frontend File Manager Plugin WordPress plugin before 21.4 does not have CSRF check when uploading files, which could allow attackers to make logged in users upload files on their behalf El plugin Frontend File Manager de WordPress versiones anteriores a 21.4, no presenta una comprobación de tipo SRF cuando son subidos archivos, lo que podría permitir a atacantes hacer que usuarios registrados suban archivos en su nombre The "Frontend File Manager Plugin" plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 21.2. This is due to missing or incorrect nonce validation on the wpfm_upload_file function. This makes it possible for unauthenticated attackers to upload files on behalf of other users, via forged request granted they can trick such a user into performing an action such as clicking on a link. • https://wpscan.com/vulnerability/7db363bf-7bef-4d47-9963-c30d6fdd2fb8 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

The Frontend File Manager Plugin WordPress plugin before 21.3 allows any unauthenticated user to rename uploaded files from users. Furthermore, due to the lack of validation in the destination filename, this could allow allow them to change the content of arbitrary files on the web server El plugin Frontend File Manager de WordPress versiones anteriores a 21.3, permite a cualquier usuario no autenticado renombrar los archivos descargados por los usuarios. Además, debido a una falta de comprobación en el nombre de archivo de destino, esto podría permitirles cambiar el contenido de archivos arbitrarios en el servidor web The Frontend File Manager plugin for WordPress is vulnerable to authorization bypass due to a missing capability check and lacking authentication in versions up to, and including, 9.8. This makes it possible for unauthenticated attackers to rename uploaded files on the site. • https://wpscan.com/vulnerability/00f76765-95af-4dbc-8c37-f1b15a0e8608 • CWE-862: Missing Authorization •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 1

The Frontend File Manager Plugin WordPress plugin before 21.3 allows any authenticated users, such as subscriber, to rename a file to an arbitrary extension, like PHP, which could allow them to basically be able to upload arbitrary files on the server and achieve RCE El plugin Frontend File Manager Plugin de WordPress versiones anteriores a 21.3, permite a cualquier usuario autenticado, como el suscriptor, renombrar un archivo a una extensión arbitraria, como PHP, lo que podría permitirles básicamente ser capaces de descargar archivos arbitrarios en el servidor y lograr un RCE The Frontend File Manager plugin for WordPress is vulnerable to arbitrary file uploads in versions up to, and including, 21.2. The vulnerability makes it possible for authenticated attackers, with subscriber-level permissions and above, to upload arbitrary files on the affected sites server and change their file extensions which may make remote code execution possible. • https://wpscan.com/vulnerability/d3d9dc9a-226b-4f76-995e-e2af1dd6b17e • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 5.8EPSS: 0%CPEs: 1EXPL: 1

The Frontend File Manager plugin for WordPress is vulnerable to Unauthenticated Post Meta Change in versions up to, and including, 18.2. This is due to lacking authentication protections, capability checks, and sanitization, all on the wpfm_file_meta_update AJAX action. This makes it possible for unauthenticated attackers to change the meta data of certain posts and pages. • https://blog.nintechnet.com/wordpress-frontend-file-manager-plugin-fixed-multiple-critical-vulnerabilities https://www.wordfence.com/threat-intel/vulnerabilities/id/5539aa79-66ad-43fa-967c-2bec877061e0?source=cve • CWE-862: Missing Authorization •