Multiple plugins and/or themes for WordPress are vulnerable to Limited File Upload in various versions. This is due to a lack of proper checks to ensure lower-privileged roles cannot upload .css and .js files to arbitrary directories. This makes it possible for authenticated attackers, with Subscriber-level access and above, and granted permissions by an administrator, to upload .css and .js files to any directory within the WordPress root directory, which could lead to Stored Cross-Site Scripting. The Advanced File Manager Shortcodes plugin must be installed to exploit this vulnerability.
Metrics
Affected Vendors & Products
References
History
Tue, 01 Oct 2024 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Advancedfilemanager
Advancedfilemanager advanced File Manager |
|
CPEs | cpe:2.3:a:advancedfilemanager:advanced_file_manager:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Advancedfilemanager
Advancedfilemanager advanced File Manager |
Thu, 26 Sep 2024 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Modalweb
Modalweb advanced File Manager |
|
CPEs | cpe:2.3:a:modalweb:advanced_file_manager:*:*:*:*:*:*:*:* | |
Vendors & Products |
Modalweb
Modalweb advanced File Manager |
|
Metrics |
ssvc
|
Thu, 26 Sep 2024 11:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Multiple plugins and/or themes for WordPress are vulnerable to Limited File Upload in various versions. This is due to a lack of proper checks to ensure lower-privileged roles cannot upload .css and .js files to arbitrary directories. This makes it possible for authenticated attackers, with Subscriber-level access and above, and granted permissions by an administrator, to upload .css and .js files to any directory within the WordPress root directory, which could lead to Stored Cross-Site Scripting. The Advanced File Manager Shortcodes plugin must be installed to exploit this vulnerability. | |
Title | Advanced File Manager <= 5.2.8 - Authenticated (Subscriber+) Limited File Upload | |
Weaknesses | CWE-434 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-09-26T13:01:50.554Z
Reserved: 2024-09-11T19:50:32.883Z
Link: CVE-2024-8725

Updated: 2024-09-26T13:01:45.738Z

Status : Analyzed
Published: 2024-09-26T11:15:11.613
Modified: 2024-10-01T14:16:42.727
Link: CVE-2024-8725

No data.