{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T14:15:22.906","vulnerabilities":[{"cve":{"id":"CVE-2024-7031","sourceIdentifier":"security@wordfence.com","published":"2024-08-03T09:15:30.353","lastModified":"2025-04-10T20:35:21.603","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"The File Manager Pro – Filester plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'njt_fs_saveSettingRestrictions' function in all versions up to, and including, 1.8.2. This makes it possible for authenticated attackers, with a role that has been granted permissions by an Administrator, to update the plugin settings for user role restrictions, including allowing file types such as .php to be uploaded."},{"lang":"es","value":"El complemento File Manager Pro – Filester para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una falta de verificación de capacidad en la función 'njt_fs_saveSettingRestrictions' en todas las versiones hasta la 1.8.2 incluida. Esto hace posible que atacantes autenticados, con una función a la que un administrador le haya otorgado permisos, actualicen la configuración del complemento para las restricciones de funciones del usuario, lo que incluye permitir que se carguen tipos de archivos como .php."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.6,"impactScore":5.9},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":8.8,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":5.9}]},"weaknesses":[{"source":"security@wordfence.com","type":"Secondary","description":[{"lang":"en","value":"CWE-862"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-862"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ninjateam:filester:*:*:*:*:*:wordpress:*:*","versionEndExcluding":"1.8.3","matchCriteriaId":"C4CB1DDB-607C-418A-90A6-D53515D677EB"}]}]}],"references":[{"url":"https://plugins.trac.wordpress.org/browser/filester/trunk/includes/File_manager/FileManager.php#L566","source":"security@wordfence.com","tags":["Product"]},{"url":"https://plugins.trac.wordpress.org/changeset/3129722/","source":"security@wordfence.com","tags":["Patch"]},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/aef584bd-60a5-4bf2-b8d3-58e3b45e785e?source=cve","source":"security@wordfence.com","tags":["Third Party Advisory"]},{"url":"https://nowotarski.info/wordpress-nonce-authorization/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Technical Description","Third Party Advisory"]}]}}]}