Vulnerabilities (CVE)

Filtered by vendor Webdesi9 Subscribe
Filtered by product File Manager
Total 4 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2024-0761 1 Webdesi9 1 File Manager 2024-11-21 N/A 8.1 HIGH
The File Manager plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 7.2.1 due to insufficient randomness in the backup filenames, which use a timestamp plus 4 random digits. This makes it possible for unauthenticated attackers, to extract sensitive data including site backups in configurations where the .htaccess file in the directory does not block access.
CVE-2021-24177 1 Webdesi9 1 File Manager 2024-11-21 3.5 LOW 5.4 MEDIUM
In the default configuration of the File Manager WordPress plugin before 7.1, a Reflected XSS can occur on the endpoint /wp-admin/admin.php?page=wp_file_manager_properties when a payload is submitted on the User-Agent parameter. The payload is then reflected back on the web application response.
CVE-2020-25213 1 Webdesi9 1 File Manager 2024-11-21 7.5 HIGH 10.0 CRITICAL
The File Manager (wp-file-manager) plugin before 6.9 for WordPress allows remote attackers to upload and execute arbitrary PHP code because it renames an unsafe example elFinder connector file to have the .php extension. This, for example, allows attackers to run the elFinder upload (or mkfile and put) command to write PHP code into the wp-content/plugins/wp-file-manager/lib/files/ directory. This was exploited in the wild in August and September 2020.
CVE-2020-24312 1 Webdesi9 1 File Manager 2024-11-21 5.0 MEDIUM 7.5 HIGH
mndpsingh287 WP File Manager v6.4 and lower fails to restrict external access to the fm_backups directory with a .htaccess file. This results in the ability for unauthenticated users to browse and download any site backups, which sometimes include full database backups, that the plugin has taken.