{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-12T21:15:41.654","vulnerabilities":[{"cve":{"id":"CVE-2024-13914","sourceIdentifier":"security@wordfence.com","published":"2025-05-15T06:15:36.480","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"The File Manager Advanced Shortcode plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.5.4 (file-manager-advanced-shortcode) and 2.5.6 (advanced-file-manager-pro-premium), via the 'file_manager_advanced' shortcode. This makes it possible for authenticated attackers, with Administrator-level access and above, to include and execute arbitrary JavaScript files on the server. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. Sites currently using 2.5.4 (file-manager-advanced-shortcode) should be updated to 2.6.0 (advanced-file-manager-pro-premium)."},{"lang":"es","value":"El complemento File Manager Advanced Shortcode para WordPress es vulnerable a la inclusión local de archivos en todas las versiones hasta la 2.5.4 (file-manager-advanced-shortcode) y la 2.5.6 (advanced-file-manager-pro-premium), incluida, a través del shortcode 'file_manager_advanced'. Esto permite a atacantes autenticados, con acceso de administrador o superior, incluir y ejecutar archivos JavaScript arbitrarios en el servidor. Esto puede utilizarse para eludir los controles de acceso, obtener datos confidenciales o ejecutar código cuando se pueden subir e incluir imágenes y otros tipos de archivos \"safe\". Los sitios que actualmente usan la versión 2.5.4 (file-manager-advanced-shortcode) deben actualizarse a la 2.6.0 (advanced-file-manager-pro-premium)."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}]},"weaknesses":[{"source":"security@wordfence.com","type":"Secondary","description":[{"lang":"en","value":"CWE-22"}]}],"references":[{"url":"https://advancedfilemanager.com/","source":"security@wordfence.com"},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/1500c72a-0621-4f97-9cab-0c9c8abeaf8f?source=cve","source":"security@wordfence.com"}]}}]}