CVE-2021-4365
🟡 Monitoruj
Brak ochrony przed uwierzytelnieniem w pluginie Frontend File Manager dla WordPressa umożliwia atakującym wstrzykiwanie skryptów.
CVSS
7.2
EPSS
1.1%
Exploit
poc
Vendor
najeebmedia
Opis źródłowy (NVD)
The Frontend File Manager plugin for WordPress is vulnerable to Unauthenticated Stored Cross-Site Scripting in versions up to, and including, 18.2. This is due to lacking authentication protections and santisation all on the wpfm_edit_file_title_desc AJAX action. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
exploit xss
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 7.2 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 1.1% |
| Opublikowano (NVD) | 2023-06-07 02:15:14 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-08 19:17:40 UTC |
Referencje
- https://blog.nintechnet.com/wordpress-frontend-file-manager-plugin-fixed-multiple-critical-vulnerabilities/ (security@wordfence.com) [Exploit]
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2554359%40nmedia-user-file-uploader&new=2554359%40nmedia-user-file-uploader&sfp_email=&sfph_mail= (security@wordfence.com) [Patch]
- https://www.wordfence.com/threat-intel/vulnerabilities/id/a9c82154-d390-44ba-a54a-89f4bb69cdce?source=cve (security@wordfence.com) [Third Party Advisory]