4 results (0.004 seconds)

CVSS: 4.3EPSS: 0%CPEs: 1EXPL: 0

The File Manager Pro – Filester plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'ajax_install_plugin' function in all versions up to, and including, 1.8.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install the Filebird plugin. • https://plugins.trac.wordpress.org/changeset/3208858/filester https://www.wordfence.com/threat-intel/vulnerabilities/id/5b09bfff-4d6e-4de0-b6ab-6ac27c4f2be6?source=cve • CWE-862: Missing Authorization •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

The File Manager Pro – Filester plugin for WordPress is vulnerable to arbitrary file uploads due to missing validation in the 'fsConnector' function in all versions up to, and including, 1.8.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, and granted permissions by an Administrator, to upload a new .htaccess file allowing them to subsequently upload arbitrary files on the affected site's server which may make remote code execution possible. El complemento File Manager Pro – Filester para WordPress es vulnerable a la carga de archivos arbitrarios debido a la falta de validación en la función 'fsConnector' en todas las versiones hasta la 1.8.4 incluida. Esto hace posible que atacantes autenticados, con acceso de nivel de suscriptor o superior, y con permisos otorgados por un administrador, carguen un nuevo archivo .htaccess que les permita cargar posteriormente archivos arbitrarios en el servidor del sitio afectado, lo que puede hacer posible la ejecución remota de código. • https://plugins.trac.wordpress.org/browser/filester/trunk/includes/File_manager/FileManager.php#L269 https://plugins.trac.wordpress.org/changeset/3186518 https://www.wordfence.com/threat-intel/vulnerabilities/id/27288836-e5d3-49fc-b1f6-319ea3b70839?source=cve • CWE-434: Unrestricted Upload of File with Dangerous Type •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

The File Manager Pro – Filester plugin for WordPress is vulnerable to Local JavaScript File Inclusion in all versions up to, and including, 1.8.5 via the 'fm_locale' parameter. This makes it possible for authenticated attackers, with Administrator-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. The vulnerability was partially patched in version 1.8.5. El complemento File Manager Pro – Filester para WordPress es vulnerable a la inclusión de archivos locales en JavaScript en todas las versiones hasta la 1.8.5 incluida a través del parámetro 'fm_locale'. • https://plugins.trac.wordpress.org/browser/filester/trunk/includes/File_manager/FileManager.php#L250 https://plugins.trac.wordpress.org/browser/filester/trunk/views/pages/html-filemanager.php#L3 https://plugins.trac.wordpress.org/changeset/3186518 https://plugins.trac.wordpress.org/changeset/3196150 https://www.wordfence.com/threat-intel/vulnerabilities/id/7d947023-60d3-4bd8-b45d-e1663326d6c1?source=cve • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

The File Manager Pro – Filester plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'njt_fs_saveSettingRestrictions' function in all versions up to, and including, 1.8.2. This makes it possible for authenticated attackers, with a role that has been granted permissions by an Administrator, to update the plugin settings for user role restrictions, including allowing file types such as .php to be uploaded. • https://plugins.trac.wordpress.org/browser/filester/trunk/includes/File_manager/FileManager.php#L566 https://plugins.trac.wordpress.org/changeset/3129722 https://www.wordfence.com/threat-intel/vulnerabilities/id/aef584bd-60a5-4bf2-b8d3-58e3b45e785e?source=cve • CWE-862: Missing Authorization •