The File Manager plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 7.2.1 due to insufficient randomness in the backup filenames, which use a timestamp plus 4 random digits. This makes it possible for unauthenticated attackers, to extract sensitive data including site backups in configurations where the .htaccess file in the directory does not block access.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-16549 | The File Manager plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 7.2.1 due to insufficient randomness in the backup filenames, which use a timestamp plus 4 random digits. This makes it possible for unauthenticated attackers, to extract sensitive data including site backups in configurations where the .htaccess file in the directory does not block access. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 17 Jun 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 24 Mar 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Filemanagerpro
Filemanagerpro file Manager |
|
| CPEs | cpe:2.3:a:filemanagerpro:file_manager:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Webdesi9
Webdesi9 file Manager |
Filemanagerpro
Filemanagerpro file Manager |
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-06-17T21:29:25.417Z
Reserved: 2024-01-19T20:27:12.161Z
Link: CVE-2024-0761
Updated: 2024-08-01T18:18:18.640Z
Status : Modified
Published: 2024-02-05T22:16:04.733
Modified: 2025-03-24T14:32:35.300
Link: CVE-2024-0761
No data.
OpenCVE Enrichment
No data.
EUVD