First published: Tue Apr 09 2024(Updated: )
The File Manager plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 7.2.5 via the fm_download_backup function. This makes it possible for authenticated attackers, with administrator access and above, to read the contents of arbitrary zip files on the server, which can contain sensitive information.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress File Manager | <=7.2.5 | |
File Manager Pro | <7.2.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-2654 is classified as a high severity vulnerability due to its potential for directory traversal attacks.
To fix CVE-2024-2654, you should upgrade the WordPress File Manager plugin to version 7.2.6 or later.
CVE-2024-2654 affects all versions of the WordPress File Manager plugin up to and including 7.2.5.
CVE-2024-2654 can facilitate authenticated attackers with administrator access to read arbitrary zip files on the server.
The fm_download_backup function in the WordPress File Manager plugin is vulnerable in CVE-2024-2654.