The Bit File Manager – 100% Free & Open Source File Manager and Code Editor for WordPress plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'upload' function in all versions up to, and including, 6.5.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, and granted upload permissions by an administrator, to upload arbitrary files on the affected site's server which may make remote code execution possible.
Metrics
Affected Vendors & Products
References
History
Thu, 26 Sep 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Bitapps
Bitapps file Manager |
|
CPEs | cpe:2.3:a:bitapps:file_manager:*:*:*:*:*:wordpress:*:* | |
Vendors & Products |
Bitapps
Bitapps file Manager |
Tue, 10 Sep 2024 14:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Bitpressadmin
Bitpressadmin bit File Manager Wordpress |
|
CPEs | cpe:2.3:a:bitpressadmin:bit_file_manager_wordpress:*:*:*:*:*:*:*:* | |
Vendors & Products |
Bitpressadmin
Bitpressadmin bit File Manager Wordpress |
|
Metrics |
ssvc
|
Tue, 10 Sep 2024 11:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Bit File Manager – 100% Free & Open Source File Manager and Code Editor for WordPress plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'upload' function in all versions up to, and including, 6.5.5. This makes it possible for authenticated attackers, with Subscriber-level access and above, and granted upload permissions by an administrator, to upload arbitrary files on the affected site's server which may make remote code execution possible. | |
Title | Bit File Manager – 100% Free & Open Source File Manager and Code Editor for WordPress <= 6.5.5 - Authenticated (Subscriber+) Arbitrary File Upload | |
Weaknesses | CWE-434 | |
References |
|
|
Metrics |
cvssV3_1
|
MITRE
Status: PUBLISHED
Assigner: Wordfence
Published: 2024-09-10T10:59:05.034Z
Updated: 2024-09-10T13:25:39.611Z
Reserved: 2024-08-13T19:11:05.331Z
Link: CVE-2024-7770
Vulnrichment
Updated: 2024-09-10T13:25:34.698Z
NVD
Status : Analyzed
Published: 2024-09-10T11:15:10.780
Modified: 2024-09-26T17:49:17.457
Link: CVE-2024-7770
Redhat
No data.