The Frontend File Manager plugin for WordPress is vulnerable to Unauthenticated HTML Injection in versions up to, and including, 18.2. This is due to lacking authentication protections on the wpfm_send_file_in_email AJAX action. This makes it possible for unauthenticated attackers to send emails using the site with a custom subject, recipient email, and body with unsanitized HTML content. This effectively lets the attacker use the site as a spam relay.
Metrics
Affected Vendors & Products
References
History
Sat, 28 Dec 2024 02:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-12-28T00:56:47.575Z
Reserved: 2023-06-06T12:40:12.785Z
Link: CVE-2021-4350

Updated: 2024-08-03T17:23:10.534Z

Status : Modified
Published: 2023-06-07T02:15:13.730
Modified: 2024-11-21T06:37:28.837
Link: CVE-2021-4350

No data.