Description
WordPress Plugin Secure File Manager is prone to a remote code execution vulnerability because it fails to sufficiently sanitize user-supplied input. Successful exploitation may allow attackers to execute arbitrary commands with the privileges of the user running the application, to compromise the application or the underlying database, to access or modify data or to compromise a vulnerable system. WordPress Plugin Secure File Manager version 2.8.1 is vulnerable; prior versions may also be affected.
Remediation
Update to plugin version 2.8.2 or latest
References
https://sploitus.com/exploit?id=WPEX-ID:47C1639F-4558-4CB6-8F50-E5E8564663C2
https://plugins.svn.wordpress.org/secure-file-manager/trunk/readme.txt
Related Vulnerabilities
Chamilo Improper Handling of Case Sensitivity Vulnerability (CVE-2023-3545)
WordPress Plugin PICA Photo Gallery 'picaPhotosResize.php' Arbitrary File Upload (1.0)
CubeCart Improper Input Validation Vulnerability (CVE-2012-0865)
WordPress Plugin Portfolio Responsive Gallery SQL Injection (1.1.7)
WordPress Plugin Embed Articles Multiple Vulnerabilities (7.0.3)