Directory Traversal Vulnerability in WordPress File Manager by Studio 42
CVE-2023-6825
What is CVE-2023-6825?
The File Manager and File Manager Pro plugins for WordPress contain a vulnerability that allows for directory traversal, exposing sensitive files on the server. This occurs due to improper validation of the target parameter within the mk_file_folder_manager_action_callback_shortcode function. Attackers can potentially access and read files located outside the intended directory, including sensitive configuration files. In the free version, administrator privileges are required for successful exploitation, while the Pro version's design permits file handling to be embedded via a shortcode. This problem is exacerbated by the ability of admins to assign file handling capabilities to lower-level users, making it easier for them to exploit this vulnerability.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
File Manager * <= 7.2.1
File Manager Pro * <= 8.3.4
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved