Description
In the default configuration of the File Manager WordPress plugin before 7.1, a Reflected XSS can occur on the endpoint /wp-admin/admin.php?page=wp_file_manager_properties when a payload is submitted on the User-Agent parameter. The payload is then reflected back on the web application response.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-11091 | In the default configuration of the File Manager WordPress plugin before 7.1, a Reflected XSS can occur on the endpoint /wp-admin/admin.php?page=wp_file_manager_properties when a payload is submitted on the User-Agent parameter. The payload is then reflected back on the web application response. |
References
History
Mon, 24 Mar 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Filemanagerpro
Filemanagerpro file Manager |
|
| CPEs | cpe:2.3:a:filemanagerpro:file_manager:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Webdesi9
Webdesi9 file Manager |
Filemanagerpro
Filemanagerpro file Manager |
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2024-08-03T19:21:18.692Z
Reserved: 2021-01-14T00:00:00.000Z
Link: CVE-2021-24177
No data.
Status : Modified
Published: 2021-04-05T19:15:16.247
Modified: 2025-03-24T14:32:35.300
Link: CVE-2021-24177
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD