First published: Wed Jun 07 2023(Updated: )
The Frontend File Manager plugin for WordPress is vulnerable to Unauthenticated Arbitrary File Download in versions up to, and including, 18.2. This is due to lacking authentication protections, capability checks, and sanitization, all on the wpfm_file_meta_update AJAX action. This makes it possible for unauthenticated attackers to download arbitrary files on the site, potentially leading to site takeover.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
N-Media Frontend File Manager | <=18.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2021-4356.
The severity level of CVE-2021-4356 is critical with a severity value of 9.8.
The Frontend File Manager plugin for WordPress is affected by CVE-2021-4356.
The cause of CVE-2021-4356 is lacking authentication protections, capability checks, and sanitization on the wpfm_file_meta_update AJAX action in the Frontend File Manager plugin for WordPress.
To fix CVE-2021-4356, update to a version of the Frontend File Manager plugin for WordPress that is higher than 18.2.