The File Manager Pro – Filester plugin for WordPress is vulnerable to Local JavaScript File Inclusion in all versions up to, and including, 1.8.5 via the 'fm_locale' parameter. This makes it possible for authenticated attackers, with Administrator-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. The vulnerability was partially patched in version 1.8.5.
Metrics
Affected Vendors & Products
References
History
Fri, 29 Nov 2024 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Ninjateam
Ninjateam filemanager Pro-filester |
|
CPEs | cpe:2.3:a:ninjateam:filemanager_pro-filester:*:*:*:*:*:*:*:* | |
Vendors & Products |
Ninjateam
Ninjateam filemanager Pro-filester |
|
Metrics |
ssvc
|
Thu, 28 Nov 2024 09:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The File Manager Pro – Filester plugin for WordPress is vulnerable to Local JavaScript File Inclusion in all versions up to, and including, 1.8.5 via the 'fm_locale' parameter. This makes it possible for authenticated attackers, with Administrator-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. The vulnerability was partially patched in version 1.8.5. | |
Title | File Manager Pro – Filester <= 1.8.5 - Authenticated (Administrator+) Local JavaScript File Inclusion | |
Weaknesses | CWE-22 | |
References |
|
|
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-11-28T08:47:32.349Z
Updated: 2024-11-29T19:24:13.054Z
Reserved: 2024-10-08T23:09:38.969Z
Link: CVE-2024-9669
Vulnrichment
Updated: 2024-11-29T19:24:08.478Z
NVD
Status : Received
Published: 2024-11-28T09:15:05.710
Modified: 2024-11-28T09:15:05.710
Link: CVE-2024-9669
Redhat
No data.