Description
WordPress Plugin File Manager is prone to a vulnerability that lets attackers upload arbitrary files because the application fails to properly verify user-supplied input. An attacker can exploit this vulnerability to upload arbitrary code and run it in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible. WordPress Plugin File Manager version 6.8 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 6.9 or latest
References
https://seravo.com/blog/0-day-vulnerability-in-wp-file-manager/
https://plugins.svn.wordpress.org/wp-file-manager/trunk/readme.txt
Related Vulnerabilities
WP eCommerce Multiple Cross-Site Scripting and SQL Injection Vulnerabilities (3.8.9)
Sqlite Unrestricted Upload of File with Dangerous Type Vulnerability (CVE-2019-19925)
PHP Permissions, Privileges, and Access Controls Vulnerability (CVE-2008-7002)
Jetty Exposure of Sensitive Information to an Unauthorized Actor Vulnerability (CVE-2015-2080)
Ruby on Rails Improper Input Validation Vulnerability (CVE-2013-3221)