The Advanced File Manager plugin for WordPress is vulnerable to Local JavaScript File Inclusion in all versions up to, and including, 5.2.8 via the 'fma_locale' parameter. This makes it possible for authenticated attackers, with Administrator-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
History

Tue, 01 Oct 2024 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Advancedfilemanager
Advancedfilemanager advanced File Manager
CPEs cpe:2.3:a:advancedfilemanager:advanced_file_manager:*:*:*:*:*:wordpress:*:*
Vendors & Products Advancedfilemanager
Advancedfilemanager advanced File Manager

Thu, 26 Sep 2024 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Modalweb
Modalweb advanced File Manager
CPEs cpe:2.3:a:modalweb:advanced_file_manager:*:*:*:*:*:*:*:*
Vendors & Products Modalweb
Modalweb advanced File Manager
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 26 Sep 2024 11:00:00 +0000

Type Values Removed Values Added
Description The Advanced File Manager plugin for WordPress is vulnerable to Local JavaScript File Inclusion in all versions up to, and including, 5.2.8 via the 'fma_locale' parameter. This makes it possible for authenticated attackers, with Administrator-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included.
Title Advanced File Manager <= 5.2.8 - Authenticated (Administrator+) Local JavaScript File Inclusion via fma_locale
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2024-09-26T10:59:33.100Z

Updated: 2024-09-26T13:06:58.427Z

Reserved: 2024-09-11T16:21:00.189Z

Link: CVE-2024-8704

cve-icon Vulnrichment

Updated: 2024-09-26T13:06:13.571Z

cve-icon NVD

Status : Analyzed

Published: 2024-09-26T11:15:11.393

Modified: 2024-10-01T14:15:09.873

Link: CVE-2024-8704

cve-icon Redhat

No data.