CVE-2021-4368
🔴 Łataj teraz
Brak kontroli uprawnień w wtyczce Frontend File Manager dla WordPressa pozwala na zmianę ustawień przez subskrybentów.
CVSS
9.9
EPSS
7.2%
Exploit
poc
Vendor
najeebmedia
Opis źródłowy (NVD)
The Frontend File Manager plugin for WordPress is vulnerable to Authenticated Settings Change in versions up to, and including, 18.2. This is due to lacking capability checks and a security nonce, all on the wpfm_save_settings AJAX action. This makes it possible for subscriber-level attackers to edit the plugin settings, such as the allowed upload file types. This can lead to remote code execution through other vulnerabilities.
exploit rce
Brak patcha
Źródła i daty
| Źródło | Wartość |
|---|---|
| NVD – CVSS | 9.9 |
| CISA KEV (aktywnie wykorzystywane) | Nie |
| FIRST EPSS (prawdopodobieństwo exploita) | 7.2% |
| Opublikowano (NVD) | 2023-06-07 02:15:14 UTC |
| Ostatnia modyfikacja (NVD) | 2026-04-08 19:17:41 UTC |
Referencje
- https://blog.nintechnet.com/wordpress-frontend-file-manager-plugin-fixed-multiple-critical-vulnerabilities/ (security@wordfence.com) [Exploit]
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=2554359%40nmedia-user-file-uploader&new=2554359%40nmedia-user-file-uploader&sfp_email=&sfph_mail= (security@wordfence.com) [Patch]
- https://www.wordfence.com/threat-intel/vulnerabilities/id/adb1d8b0-b1d6-40df-b591-f1062ee744fb?source=cve (security@wordfence.com) [Third Party Advisory]