A Cross-Site Request Forgery (CSRF) vulnerability has been identified in the WordPress File Manager Pro Plugin. This vulnerability could allow a malicious actor to force higher privileged users to execute unwanted actions under their current authentication.
This vulnerability was discovered and responsibly reported by Dmitrii Ignatyev.
The vulnerability is a CSRF vulnerability that occurs in the filemanager-pro.php file. The vulnerability allows an attacker to exploit a flaw in the way that the plugin handles user input to trick a higher-privileged user into performing an unwanted action.
Severity:
The vulnerability has a CVSS 3.1 score of 8.8, which is considered to be critical. This means that the vulnerability is very likely to be exploited and could have a severe impact on the affected system.
Affected Versions:
The vulnerability affects all versions of the File Manager Pro Plugin prior to 1.8.
Impact:
An attacker who successfully exploits this vulnerability could:
- Force a higher privileged user to delete or modify files.
- Force a higher privileged user to install malicious plugins or themes.
- Force a higher privileged user to change the website’s configuration.
- Take any other action that the higher privileged user could do.
Recommendation:
Users of the File Manager Pro Plugin are strongly advised to update to take the following actions:
- Update Plugin: First and foremost, update the File Manager Pro Plugin to the latest available version, which is at least 1.8. This update contains the security patches to mitigate the CSRF vulnerability.
- Regular Security Audits: Conduct regular security audits of the WordPress website to identify and address vulnerabilities promptly. Utilize security plugins and tools to assist in this process.