TROYANOSYVIRUS
Retour aux CVEs

CVE-2020-25213

CRITICALCISA KEV
10.0

Description

The File Manager (wp-file-manager) plugin before 6.9 for WordPress allows remote attackers to upload and execute arbitrary PHP code because it renames an unsafe example elFinder connector file to have the .php extension. This, for example, allows attackers to run the elFinder upload (or mkfile and put) command to write PHP code into the wp-content/plugins/wp-file-manager/lib/files/ directory. This was exploited in the wild in August and September 2020.

Details CVE

Score CVSS v3.110.0
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie9/9/2020
Derniere modification11/7/2025
Sourcekev
Observations honeypot0

CISA KEV

FournisseurWordPress
ProduitFile Manager Plugin
Nom vulnerabiliteWordPress File Manager Plugin Remote Code Execution Vulnerability
Date ajout KEV2021-11-03
Date limite remediation2022-05-03
Utilise dans ransomwareUnknown

Produits affectes

filemanagerpro:file_manager

Faiblesses (CWE)

CWE-434CWE-434

References

https://github.com/w4fz5uck5/wp-file-manager-0day(af854a3a-2127-422b-91ae-364da2661108)
https://plugins.trac.wordpress.org/changeset/2373068(af854a3a-2127-422b-91ae-364da2661108)
https://wordpress.org/plugins/wp-file-manager/#developers(af854a3a-2127-422b-91ae-364da2661108)

Correlations IOC

Aucune correlation enregistree

This product uses data from the NVD API but is not endorsed or certified by the NVD.