First published: Thu Mar 21 2024(Updated: )
The File Manager plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 7.2.4. This is due to missing or incorrect nonce validation on the wp_file_manager page that includes files through the 'lang' parameter. This makes it possible for unauthenticated attackers to include local JavaScript files that can be leveraged to achieve RCE via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. This issue was partially patched in version 7.2.4, and fully patched in 7.2.5.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress File Manager | <=7.2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-1538 is classified as a Cross-Site Request Forgery (CSRF) vulnerability, which can allow unauthorized actions to be performed on behalf of a user.
To fix CVE-2024-1538, update the WordPress File Manager plugin to version 7.2.5 or later, which addresses the nonce validation issue.
All versions of the WordPress File Manager plugin up to and including 7.2.4 are affected by CVE-2024-1538.
Yes, CVE-2024-1538 can be exploited by unauthenticated users due to the missing or incorrect nonce validation.
CVE-2024-1538 affects the wp_file_manager page that includes files through the 'lang' parameter, exploiting the CSRF vulnerability.