Vulnerability in WordPress File Management Plugins
A recent advisory has been issued for three WordPress file management plugins that are affected by a vulnerability. This vulnerability allows unauthenticated attackers to delete arbitrary files, and it’s estimated that over 1.3 million websites have these plugins installed.
What’s Causing the Vulnerability?
The issue is caused by outdated versions of the elFinder file manager, specifically versions 2.1.64 and earlier. These versions contain a Directory Traversal vulnerability, which enables attackers to manipulate file paths and access files outside the intended directory. By sending requests with specific sequences, an attacker could make the file manager access and delete arbitrary files.
How Does the Attack Work?
The attack works by sending requests with sequences such as example.com/../../../../, which allows the attacker to reach outside the intended directory. This means that an attacker could potentially delete important files, causing significant damage to a website.
Affected Plugins
The following three plugins are affected by this vulnerability:
1. File Manager WordPress Plugin, with over 1 million installations
2. Advanced File Manager – Ultimate WP File Manager And Document Library Solution, with over 200,000 installations
3. File Manager Pro – Filester, with over 100,000 installations
Exploitation and Mitigation
According to the advisory, the vulnerability can be exploited without authentication, but only if a site owner has made the file manager publicly accessible. However, two of the plugins require at least a subscriber-level authentication, which is the lowest level of website credentials. To mitigate the possibility of exploitation, users of these plugins should update to the latest versions as soon as possible.
Conclusion
The vulnerability in these WordPress file management plugins is a significant concern, as it allows unauthenticated attackers to delete arbitrary files. With over 1.3 million websites affected, it’s essential that users take immediate action to update their plugins and prevent potential attacks. By doing so, they can protect their websites from damage and ensure the security of their files.