Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2023-6825Relative Path Traversal in Manager PRO

Severity
9.9CRITICALNVD
EPSS
71.0%
top 1.29%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedMar 13

Description

The File Manager and File Manager Pro plugins for WordPress are vulnerable to Directory Traversal in versions up to, and including version 7.2.1 (free version) and 8.3.4 (Pro version) via the target parameter in the mk_file_folder_manager_action_callback_shortcode function. This makes it possible for attackers to read the contents of arbitrary files on the server, which can contain sensitive information and to upload files into directories other than the intended directory for file uploads. The

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:HExploitability: 3.1 | Impact: 6.0

Affected Packages3 packages

Patches

🔴Vulnerability Details

2
GHSA
GHSA-jxf2-w3fh-qg4v: The File Manager and File Manager Pro plugins for WordPress are vulnerable to Directory Traversal in versions up to, and including version 72024-03-13
CVEList
File Manager And File Manager Pro (Multiple Versions) - Directory Traversal2024-03-13

💥Exploits & PoCs

1
Nuclei
WordPress File Manager <= 7.2.1 - Directory Traversal