CVE-2023-6825
File Manager And File Manager Pro (Multiple Versions) - Directory Traversal
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The File Manager and File Manager Pro plugins for WordPress are vulnerable to Directory Traversal in versions up to, and including version 7.2.1 (free version) and 8.3.4 (Pro version) via the target parameter in the mk_file_folder_manager_action_callback_shortcode function. This makes it possible for attackers to read the contents of arbitrary files on the server, which can contain sensitive information and to upload files into directories other than the intended directory for file uploads. The free version requires Administrator access for this vulnerability to be exploitable. The Pro version allows a file manager to be embedded via a shortcode and also allows admins to grant file handling privileges to other user levels, which could lead to this vulnerability being exploited by lower-level users.
Los complementos File Manager y File Manager Pro para WordPress son vulnerables a Directory Traversal en versiones hasta la versión 7.2.1 (versión gratuita) y 8.3.4 (versión Pro) incluida a través del parámetro de destino en la función mk_file_folder_manager_action_callback_shortcode. Esto hace posible que los atacantes lean el contenido de archivos arbitrarios en el servidor, que pueden contener información confidencial, y cargar archivos en directorios distintos al directorio previsto para la carga de archivos. La versión gratuita requiere acceso de administrador para que esta vulnerabilidad sea explotable. La versión Pro permite integrar un administrador de archivos a través de un código corto y también permite a los administradores otorgar privilegios de manejo de archivos a otros niveles de usuario, lo que podría llevar a que usuarios de niveles inferiores aprovechen esta vulnerabilidad.
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2023-12-14 CVE Reserved
- 2024-03-04 CVE Published
- 2024-03-14 EPSS Updated
- 2024-08-08 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-23: Relative Path Traversal
CAPEC
References (3)
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Mndpsingh287 Search vendor "Mndpsingh287" | File Manager Search vendor "Mndpsingh287" for product "File Manager" | <= 7.2.1 Search vendor "Mndpsingh287" for product "File Manager" and version " <= 7.2.1" | en |
Affected
| ||||||
File Manager Search vendor "File Manager" | File Manager Pro Search vendor "File Manager" for product "File Manager Pro" | <= 8.3.4 Search vendor "File Manager" for product "File Manager Pro" and version " <= 8.3.4" | en |
Affected
|