Temporary File Vulnerability Affects Bit File Manager WordPress Plugin
CVE-2024-7627
Key Information:
- Vendor
- Wordpress
- Vendor
- CVE Published:
- 5 September 2024
Badges
Summary
The Bit File Manager plugin for WordPress has a vulnerability that allows remote code execution. This issue arises from the 'checkSyntax' function, which inadequately validates files before creating a temporary file in a publicly accessible directory. As a result, if an administrator has granted Guest User read permissions, unauthenticated attackers can potentially execute arbitrary code on the server. Website owners using the affected versions of this plugin should take immediate action to secure their sites against this vulnerability.
Affected Version(s)
Bit File Manager β 100% Free & Open Source File Manager and Code Editor for WordPress 6.0 <= 6.5.5
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
References
CVSS V3.1
Timeline
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved