Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2026-0829

Severity
5.8MEDIUM
EPSS
2.9%
top 13.73%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedFeb 17

Description

The Frontend File Manager Plugin WordPress plugin through 23.5 allows unauthenticated users to send emails through the site without any security checks. This lets attackers use the WordPress site as an open relay for spam or phishing emails to anyone. Attackers can also guess file IDs to access and share uploaded files without permission, exposing sensitive information.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages1 packages

🔴Vulnerability Details

2
GHSA
GHSA-wmq7-3p89-w6h8: The Frontend File Manager Plugin WordPress plugin through 232026-02-17
CVEList
Frontend File Manager Plugin <= 23.5 - Unauthenticated Arbitrary Email Sending2026-02-17

💥Exploits & PoCs

1
Nuclei
Frontend File Manager Plugin <= 23.5 - Unauthenticated Arbitrary Email Sending

🕵️Threat Intelligence

1
Wiz
CVE-2026-0829 Impact, Exploitability, and Mitigation Steps | Wiz
CVE-2026-0829 (MEDIUM CVSS 5.8) | The Frontend File Manager Plugin Wo | cvebase.io