The File Manager plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 7.2.1 due to insufficient randomness in the backup filenames, which use a timestamp plus 4 random digits. This makes it possible for unauthenticated attackers, to extract sensitive data including site backups in configurations where the .htaccess file in the directory does not block access.
References
Configurations
History
13 Feb 2024, 17:16
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:webdesi9:file_manager:*:*:*:*:*:wordpress:*:* | |
Summary |
|
|
CWE | CWE-330 | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
References | () https://plugins.trac.wordpress.org/changeset/3023403/wp-file-manager/trunk/file_folder_manager.php?old=2984933&old_path=wp-file-manager%2Ftrunk%2Ffile_folder_manager.php - Patch | |
References | () https://wordpress.org/plugins/wp-file-manager/ - Product | |
References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/1928f8e4-8bbe-4a3f-8284-aa12ca2f5176?source=cve - Third Party Advisory | |
First Time |
Webdesi9
Webdesi9 file Manager |
05 Feb 2024, 22:16
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-02-05 22:16
Updated : 2024-02-13 17:16
NVD link : CVE-2024-0761
Mitre link : CVE-2024-0761
CVE.ORG link : CVE-2024-0761
JSON object : View
Products Affected
webdesi9
- file_manager
CWE
CWE-330
Use of Insufficiently Random Values