The File Manager plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 7.2.1 due to insufficient randomness in the backup filenames, which use a timestamp plus 4 random digits. This makes it possible for unauthenticated attackers, to extract sensitive data including site backups in configurations where the .htaccess file in the directory does not block access.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-16549 | The File Manager plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 7.2.1 due to insufficient randomness in the backup filenames, which use a timestamp plus 4 random digits. This makes it possible for unauthenticated attackers, to extract sensitive data including site backups in configurations where the .htaccess file in the directory does not block access. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 17 Jun 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 24 Mar 2025 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Filemanagerpro
Filemanagerpro file Manager |
|
| CPEs | cpe:2.3:a:filemanagerpro:file_manager:*:*:*:*:*:wordpress:*:* | |
| Vendors & Products |
Webdesi9
Webdesi9 file Manager |
Filemanagerpro
Filemanagerpro file Manager |
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-06-17T21:29:25.417Z
Reserved: 2024-01-19T20:27:12.161Z
Link: CVE-2024-0761
Updated: 2024-08-01T18:18:18.640Z
Status : Modified
Published: 2024-02-05T22:16:04.733
Modified: 2025-03-24T14:32:35.300
Link: CVE-2024-0761
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD