CVE-2024-2654

The File Manager plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 7.2.5 via the fm_download_backup function. This makes it possible for authenticated attackers, with administrator access and above, to read the contents of arbitrary zip files on the server, which can contain sensitive information.
Configurations

Configuration 1 (hide)

cpe:2.3:a:filemanagerpro:file_manager:*:*:*:*:free:wordpress:*:*

History

24 Mar 2025, 14:41

Type Values Removed Values Added
CPE cpe:2.3:a:webdesi9:file_manager:*:*:*:*:*:wordpress:*:* cpe:2.3:a:filemanagerpro:file_manager:*:*:*:*:free:wordpress:*:*
First Time Filemanagerpro
Filemanagerpro file Manager

24 Mar 2025, 14:31

Type Values Removed Values Added
References () https://plugins.trac.wordpress.org/browser/wp-file-manager/trunk/file_folder_manager.php#L1353 - () https://plugins.trac.wordpress.org/browser/wp-file-manager/trunk/file_folder_manager.php#L1353 - Product
References () https://plugins.trac.wordpress.org/changeset/3062387/wp-file-manager/trunk?contextall=1&old=3051451&old_path=%2Fwp-file-manager%2Ftrunk - () https://plugins.trac.wordpress.org/changeset/3062387/wp-file-manager/trunk?contextall=1&old=3051451&old_path=%2Fwp-file-manager%2Ftrunk - Patch
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/ca98fbc6-8cfa-4997-8a46-344afb75a97e?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/ca98fbc6-8cfa-4997-8a46-344afb75a97e?source=cve - Third Party Advisory
First Time Webdesi9 file Manager
Webdesi9
CPE cpe:2.3:a:webdesi9:file_manager:*:*:*:*:*:wordpress:*:*

26 Feb 2025, 18:15

Type Values Removed Values Added
CWE CWE-35

21 Nov 2024, 09:10

Type Values Removed Values Added
References () https://plugins.trac.wordpress.org/browser/wp-file-manager/trunk/file_folder_manager.php#L1353 - () https://plugins.trac.wordpress.org/browser/wp-file-manager/trunk/file_folder_manager.php#L1353 -
References () https://plugins.trac.wordpress.org/changeset/3062387/wp-file-manager/trunk?contextall=1&old=3051451&old_path=%2Fwp-file-manager%2Ftrunk - () https://plugins.trac.wordpress.org/changeset/3062387/wp-file-manager/trunk?contextall=1&old=3051451&old_path=%2Fwp-file-manager%2Ftrunk -
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/ca98fbc6-8cfa-4997-8a46-344afb75a97e?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/ca98fbc6-8cfa-4997-8a46-344afb75a97e?source=cve -
Summary
  • (es) El complemento File Manager para WordPress es vulnerable a Directory Traversal en todas las versiones hasta la 7.2.5 incluida a través de la función fm_download_backup. Esto hace posible que atacantes autenticados, con acceso de administrador y superior, lean el contenido de archivos zip arbitrarios en el servidor, que pueden contener información confidencial.

09 Apr 2024, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-04-09 19:15

Updated : 2025-03-24 14:41


NVD link : CVE-2024-2654

Mitre link : CVE-2024-2654

CVE.ORG link : CVE-2024-2654


JSON object : View

Products Affected

filemanagerpro

  • file_manager
CWE
CWE-35

Path Traversal: '.../...//'