Plattform
wordpress
Komponente
file-manager-advanced-shortcode
Behoben in
2.6.0
2.6.0
CVE-2024-13914 describes a Local File Inclusion (LFI) vulnerability discovered in the File Manager Advanced Shortcode plugin for WordPress. This vulnerability allows authenticated administrators to include and execute arbitrary JavaScript files on the server, leading to potential data theft and code execution. The vulnerability impacts versions up to and including 2.5.6, and a fix is available in version 2.6.0.
An attacker exploiting this LFI vulnerability can leverage the 'filemanageradvanced' shortcode to include malicious JavaScript files. Because administrators have the ability to upload images and other seemingly safe file types, they can be included and executed, effectively bypassing access controls. This can lead to the theft of sensitive data stored on the WordPress server, including user credentials, database information, and potentially even system configuration files. The attacker could also achieve remote code execution, allowing them to take complete control of the affected WordPress instance. The impact is amplified in environments where the WordPress installation has weak security configurations or is running outdated plugins.
This vulnerability is currently not listed on the CISA KEV catalog. Public proof-of-concept exploits are not widely available, but the potential for exploitation is considered medium due to the ease of exploitation for authenticated administrators. The vulnerability was publicly disclosed on 2025-05-15. Active campaigns targeting WordPress plugins are common, so vigilance is advised.
WordPress sites utilizing the File Manager Advanced Shortcode plugin, particularly those with administrator accounts that have access to the file management functionality, are at risk. Shared hosting environments where multiple WordPress installations share the same server resources are also at increased risk, as a compromise of one site could potentially lead to the compromise of others.
• wordpress / plugin:
wp plugin list | grep 'File Manager Advanced Shortcode'• wordpress / plugin: Check the plugin version. If it's <= 2.5.6, the system is vulnerable.
wp plugin list --status=active | grep 'File Manager Advanced Shortcode'• wordpress / plugin: Examine WordPress logs for suspicious file inclusion attempts involving the 'filemanageradvanced' shortcode.
grep 'file_manager_advanced' /var/log/apache2/error.log• wordpress / plugin: Review file upload directories for unexpected JavaScript files.
ls -l /path/to/wordpress/wp-content/uploads/disclosure
Exploit-Status
EPSS
0.71% (72% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2024-13914 is to immediately upgrade the File Manager Advanced Shortcode plugin to version 2.6.0 or later. If upgrading is not immediately feasible due to compatibility issues or breaking changes, consider temporarily restricting administrator access to the file manager functionality. Web Application Firewalls (WAFs) configured to detect and block suspicious file inclusion attempts can provide an additional layer of protection. Monitor WordPress access logs for unusual file access patterns or JavaScript execution attempts. Implement strict file upload validation to prevent the upload of executable JavaScript files.
Actualice el plugin File Manager Advanced Shortcode a la versión 2.6.0 o superior. Esta actualización corrige la vulnerabilidad de inclusión de archivos locales que permite la ejecución de código JavaScript arbitrario.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2024-13914 is a Local File Inclusion vulnerability in the File Manager Advanced Shortcode WordPress plugin, allowing authenticated admins to execute JavaScript. It has a CVSS score of 7.2 (HIGH).
You are affected if you are using File Manager Advanced Shortcode version 2.5.6 or earlier. Upgrade to 2.6.0 to resolve the vulnerability.
Upgrade the File Manager Advanced Shortcode plugin to version 2.6.0 or later. If immediate upgrade is not possible, restrict administrator access to file management features.
While no active exploitation has been publicly confirmed, the vulnerability's nature makes it a likely target for attackers. Monitoring and mitigation are crucial.
Refer to the plugin developer's website or WordPress.org plugin repository for the official advisory and update information.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.