{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T19:39:51.467","vulnerabilities":[{"cve":{"id":"CVE-2016-15042","sourceIdentifier":"security@wordfence.com","published":"2024-10-16T08:15:02.990","lastModified":"2024-10-30T21:12:53.463","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"The Frontend File Manager (versions < 4.0), N-Media Post Front-end Form (versions < 1.1) plugins for WordPress are vulnerable to arbitrary file uploads due to missing file type validation via the `nm_filemanager_upload_file` and `nm_postfront_upload_file` AJAX actions. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected sites server which may make remote code execution possible."},{"lang":"es","value":"Los complementos Frontend File Manager (versiones &lt; 4.0) y N-Media Post Front-end Form (versiones &lt; 1.1) para WordPress son vulnerables a la carga de archivos arbitrarios debido a la falta de validación del tipo de archivo a través de las acciones AJAX `nm_filemanager_upload_file` y `nm_postfront_upload_file`. Esto hace posible que atacantes no autenticados carguen archivos arbitrarios en el servidor de los sitios afectados, lo que puede hacer posible la ejecución remota de código."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"security@wordfence.com","type":"Secondary","description":[{"lang":"en","value":"CWE-434"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:najeebmedia:frontend_file_manager:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"4.0","matchCriteriaId":"5D5FA008-4897-428E-A09C-48434C6698CF"},{"vulnerable":true,"criteria":"cpe:2.3:a:najeebmedia:post_front-end_form:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"1.1","matchCriteriaId":"2020D895-431F-4D4C-BEA9-66CD2459A2F2"}]}]}],"references":[{"url":"https://wordpress.org/plugins/nmedia-user-file-uploader/#developers","source":"security@wordfence.com","tags":["Product"]},{"url":"https://wpscan.com/vulnerability/052f7d9a-aaff-4fb1-92b7-aeb83cc705a7","source":"security@wordfence.com","tags":["Third Party Advisory"]},{"url":"https://www.acunetix.com/vulnerabilities/web/wordpress-plugin-n-media-post-front-end-form-arbitrary-file-upload-1-0/","source":"security@wordfence.com","tags":["Third Party Advisory"]},{"url":"https://www.pluginvulnerabilities.com/2016/09/19/arbitrary-file-upload-vulnerability-in-front-end-file-upload-and-manager-plugin/","source":"security@wordfence.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.pluginvulnerabilities.com/2016/09/19/arbitrary-file-upload-vulnerability-in-n-media-post-front-end-form/","source":"security@wordfence.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/2c1e6298-f243-49a5-b1b7-52bd6a6c8858?source=cve","source":"security@wordfence.com","tags":["Third Party Advisory"]}]}}]}