The Frontend File Manager plugin for WordPress is vulnerable to Unauthenticated HTML Injection in versions up to, and including, 18.2. This is due to lacking authentication protections on the wpfm_send_file_in_email AJAX action. This makes it possible for unauthenticated attackers to send emails using the site with a custom subject, recipient email, and body with unsanitized HTML content. This effectively lets the attacker use the site as a spam relay.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-34177 The Frontend File Manager plugin for WordPress is vulnerable to Unauthenticated HTML Injection in versions up to, and including, 18.2. This is due to lacking authentication protections on the wpfm_send_file_in_email AJAX action. This makes it possible for unauthenticated attackers to send emails using the site with a custom subject, recipient email, and body with unsanitized HTML content. This effectively lets the attacker use the site as a spam relay.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Sat, 28 Dec 2024 02:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2024-12-28T00:56:47.575Z

Reserved: 2023-06-06T12:40:12.785Z

Link: CVE-2021-4350

cve-icon Vulnrichment

Updated: 2024-08-03T17:23:10.534Z

cve-icon NVD

Status : Modified

Published: 2023-06-07T02:15:13.730

Modified: 2024-11-21T06:37:28.837

Link: CVE-2021-4350

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.