File Manager Vulnerability – Authenticated Directory Traversal – CVE-2024-2654 | WordPress Plugin Vulnerability Report
Plugin Name: File Manager
Key Information:
- Software Type: Plugin
- Software Slug: wp-file-manager
- Software Status: Active
- Software Author: mndpsingh287
- Software Downloads: 21,240,440
- Active Installs: 1,000,000
- Last Updated: April 3, 2024
- Patched Versions: 7.2.6
- Affected Versions: <= 7.2.5
Vulnerability Details:
- Name: File Manager <= 7.2.5
- Title: Authenticated (Administrator+) Directory Traversal
- Type: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N
- CVE: CVE-2024-2654
- CVSS Score: 6.4
- Publicly Published: April 3, 2024
- Researcher: DarkT
- Description: The File Manager plugin, integral to WordPress for managing files directly from the dashboard, has been discovered to have a critical Directory Traversal vulnerability in versions up to and including 7.2.5. This flaw, specifically within the fm_download_backup function, allows authenticated users with administrative privileges to access arbitrary zip files on the server, potentially exposing sensitive data.
Summary:
The File Manager plugin, a popular tool among WordPress users for file management, is currently under scrutiny due to a vulnerability identified in versions up to 7.2.5. CVE-2024-2654, as it is known, enables authenticated administrators to exploit the plugin's backup download functionality, leading to possible Directory Traversal attacks. This vulnerability has been addressed in the newly released patch, version 7.2.6.
Detailed Overview:
Research conducted by DarkT unveiled this significant security concern, shedding light on the potential risks associated with inadequate function restrictions within the plugin. Directory Traversal attacks such as this could allow malicious actors to navigate the server's directory structure, accessing or manipulating files outside of the intended directories. The prompt release of version 7.2.6 by the plugin developers aims to fortify the plugin against such vulnerabilities, ensuring the security of WordPress sites using File Manager.
Advice for Users:
- Immediate Action: Users of the File Manager plugin are strongly encouraged to update to version 7.2.6 immediately to safeguard their sites against this vulnerability.
- Check for Signs of Vulnerability: Site administrators should monitor server logs and file access patterns for unusual activities that might indicate exploitation attempts.
- Alternate Plugins: While the patch resolves the immediate threat, users may consider evaluating other file management plugins, particularly those with a robust track record of security and frequent updates.
- Stay Updated: The dynamic nature of web security underscores the importance of regular updates to plugins, themes, and the WordPress core itself.
Conclusion:
The resolution of CVE-2024-2654 in the File Manager plugin highlights the critical role of ongoing vigilance and timely updates in the realm of web security. For WordPress site operators, particularly small business owners who often manage their digital presence alongside myriad other responsibilities, this incident serves as a poignant reminder of the imperative to maintain an up-to-date and secure online infrastructure. In an era where digital threats are ever-present and evolving, the commitment to proactive security practices is indispensable in safeguarding the integrity and trustworthiness of your online presence.
References:
- Wordfence Vulnerability Report for CVE-2024-2654
- Additional Information on File Manager Vulnerabilities