Description
Several WordPress plugins using elFinder versions 2.1.64 and prior are vulnerable to Directory Traversal in various versions. This makes it possible for unauthenticated attackers to delete arbitrary files. Successful exploitation of this vulnerability requires a site owner to explicitly make an instance of the file manager available to users.
Published: 2025-08-13
Score: 6.5 Medium
EPSS: 1.4% Low
KEV: No
Impact: Unauthenticated directory traversal enabling arbitrary file deletion
Action: Patch immediately
AI Analysis

Impact

The vulnerability arises from a directory traversal flaw in elFinder classes used by several WordPress plugins. An attacker who can reach the exposed file manager instance can craft a path that writes outside of the intended workspace, allowing deletion of any file on the server. The flaw has a CWE‑22 designation, and because it does not involve credential compromise, the primary impact is integrity and availability loss of protected files.

Affected Systems

Products impacted include File Manager Pro, ninjateam’s Filester, and saadiqbal’s Advanced File ManagerUltimate File Manager for WordPress. All affected plugins incorporate elFinder 2.1.64 or older versions, which implement the vulnerable directory handling logic.

Risk and Exploitability

The CVSS score of 6.5 reflects a moderate severity, while an EPSS score of about 1% assigns a low exploitation probability. The vulnerability is not listed in CISA’s KEV catalog. Attackers need only unauthenticated access to the file manager URL and the tool must be made publicly available; the flaw can be exploited remotely over the web and permits deletion of arbitrary files.

Generated by OpenCVE AI on April 21, 2026 at 19:24 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the WordPress plugins (File Manager Pro, Filester, Advanced File Manager) to the latest versions that include the elFinder 2.1.65 or newer release, which removes the directory traversal flaw.
  • If an update cannot be applied immediately, restrict access to the file manager interface by enforcing authentication or removing the file manager from publicly accessible URLs.
  • As a temporary workaround, configure the elFinder instance to use a restrictive root path, enable the readOnly mode for delete operations, and whitelist accepted file paths to prevent deletion outside the intended workspace.

Generated by OpenCVE AI on April 21, 2026 at 19:24 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-24540 Several WordPress plugins using elFinder versions 2.1.64 and prior are vulnerable to Directory Traversal in various versions. This makes it possible for unauthenticated attackers to delete arbitrary files. Successful exploitation of this vulnerability requires a site owner to explicitly make an instance of the file manager available to users.
History

Thu, 14 Aug 2025 06:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Wed, 13 Aug 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 13 Aug 2025 04:00:00 +0000

Type Values Removed Values Added
Description Several WordPress plugins using elFinder versions 2.1.64 and prior are vulnerable to Directory Traversal in various versions. This makes it possible for unauthenticated attackers to delete arbitrary files. Successful exploitation of this vulnerability requires a site owner to explicitly make an instance of the file manager available to users.
Title Multiple elFinder Plugins <= (Various Versions) - Directory Traversal to Arbitrary File Deletion
Weaknesses CWE-22
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:20:11.705Z

Reserved: 2025-01-28T21:23:43.968Z

Link: CVE-2025-0818

cve-icon Vulnrichment

Updated: 2025-08-13T14:01:49.584Z

cve-icon NVD

Status : Deferred

Published: 2025-08-13T04:16:08.373

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-0818

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T19:30:06Z

Weaknesses