{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-25T01:49:14.701","vulnerabilities":[{"cve":{"id":"CVE-2023-6825","sourceIdentifier":"security@wordfence.com","published":"2024-03-13T16:15:08.850","lastModified":"2026-04-08T18:18:42.997","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The File Manager and File Manager Pro plugins for WordPress are vulnerable to Directory Traversal in versions up to, and including version 7.2.1 (free version) and 8.3.4 (Pro version) via the target parameter in the  mk_file_folder_manager_action_callback_shortcode function. This makes it possible for attackers to read the contents of arbitrary files on the server, which can contain sensitive information and to upload files into directories other than the intended directory for file uploads. The free version requires Administrator access for this vulnerability to be exploitable. The Pro version allows a file manager to be embedded via a shortcode and also allows admins to grant file handling privileges to other user levels, which could lead to this vulnerability being exploited by lower-level users."},{"lang":"es","value":"Los complementos File Manager y File Manager Pro para WordPress son vulnerables a Directory Traversal en versiones hasta la versión 7.2.1 (versión gratuita) y 8.3.4 (versión Pro) incluida a través del parámetro de destino en la función mk_file_folder_manager_action_callback_shortcode. Esto hace posible que los atacantes lean el contenido de archivos arbitrarios en el servidor, que pueden contener información confidencial, y cargar archivos en directorios distintos al directorio previsto para la carga de archivos. La versión gratuita requiere acceso de administrador para que esta vulnerabilidad sea explotable. La versión Pro permite integrar un administrador de archivos a través de un código corto y también permite a los administradores otorgar privilegios de manejo de archivos a otros niveles de usuario, lo que podría llevar a que usuarios de niveles inferiores aprovechen esta vulnerabilidad."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","baseScore":9.9,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.1,"impactScore":6.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H","baseScore":9.9,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.1,"impactScore":6.0}]},"weaknesses":[{"source":"security@wordfence.com","type":"Primary","description":[{"lang":"en","value":"CWE-23"}]},{"source":"nvd@nist.gov","type":"Secondary","description":[{"lang":"en","value":"CWE-22"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mndpsingh287:file_manager:*:*:*:*:free:wordpress:*:*","versionEndIncluding":"7.2.1","matchCriteriaId":"8A3469FC-AC6C-4E02-BB59-C40DC731C47E"},{"vulnerable":true,"criteria":"cpe:2.3:a:mndpsingh287:file_manager:*:*:*:*:pro:wordpress:*:*","versionEndIncluding":"8.3.4","matchCriteriaId":"4C3BE4E5-2291-4FEE-9EAE-50BA86E900E0"}]}]}],"references":[{"url":"https://github.com/Studio-42/elFinder/blob/master/php/elFinderVolumeDriver.class.php#L6784","source":"security@wordfence.com","tags":["Product"]},{"url":"https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3023403%40wp-file-manager%2Ftrunk&old=2984933%40wp-file-manager%2Ftrunk&sfp_email=&sfph_mail=","source":"security@wordfence.com","tags":["Patch"]},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/93f377a1-2c33-4dd7-8fd6-190d9148e804?source=cve","source":"security@wordfence.com","tags":["Third Party Advisory"]},{"url":"https://github.com/Studio-42/elFinder/blob/master/php/elFinderVolumeDriver.class.php#L6784","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Product"]},{"url":"https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3023403%40wp-file-manager%2Ftrunk&old=2984933%40wp-file-manager%2Ftrunk&sfp_email=&sfph_mail=","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/93f377a1-2c33-4dd7-8fd6-190d9148e804?source=cve","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}}]}