Skip to main content

CVE-2023-40204: CWE-434 Unrestricted Upload of File with Dangerous Type in Premio Folders – Unlimited Folders to Organize Media Library Folder, Pages, Posts, File Manager

Critical
VulnerabilityCVE-2023-40204cvecve-2023-40204cwe-434
Published: Wed Dec 20 2023 (12/20/2023, 18:41:38 UTC)
Source: CVE
Vendor/Project: Premio
Product: Folders – Unlimited Folders to Organize Media Library Folder, Pages, Posts, File Manager

Description

Unrestricted Upload of File with Dangerous Type vulnerability in Premio Folders – Unlimited Folders to Organize Media Library Folder, Pages, Posts, File Manager.This issue affects Folders – Unlimited Folders to Organize Media Library Folder, Pages, Posts, File Manager: from n/a through 2.9.2.

AI-Powered Analysis

AILast updated: 06/24/2025, 22:49:17 UTC

Technical Analysis

CVE-2023-40204 is a critical vulnerability classified under CWE-434, which pertains to the unrestricted upload of files with dangerous types. This vulnerability affects the WordPress plugin "Folders – Unlimited Folders to Organize Media Library Folder, Pages, Posts, File Manager" developed by Premio, specifically versions up to and including 2.9.2. The flaw allows an authenticated user with high privileges (PR:H) to upload files without proper validation or restriction on file types, enabling the upload of potentially malicious files such as web shells, scripts, or executables. The vulnerability is exploitable remotely over the network (AV:N) without requiring user interaction (UI:N), and it has a low attack complexity (AC:L). The scope is changed (S:C), indicating that the vulnerability affects resources beyond the initially vulnerable component, potentially impacting the entire WordPress installation. The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H), meaning an attacker could fully compromise the affected system, execute arbitrary code, manipulate or steal data, and disrupt service availability. Although no known exploits are currently reported in the wild, the high CVSS score of 9.1 reflects the severe risk posed by this vulnerability if exploited. The lack of available patches at the time of reporting increases the urgency for mitigation. Given the plugin’s role in managing media libraries and file organization within WordPress sites, this vulnerability could be leveraged to gain persistent access or pivot within compromised environments.

Potential Impact

For European organizations, the impact of CVE-2023-40204 is significant, especially for those relying on WordPress sites utilizing the affected Premio Folders plugin for content management and media organization. Exploitation could lead to full system compromise, data breaches involving sensitive or personal data protected under GDPR, defacement of websites, and disruption of online services. This could result in reputational damage, regulatory penalties, and operational downtime. Sectors such as e-commerce, media, government, and education, which often use WordPress extensively, are particularly at risk. The ability to upload arbitrary files without restriction can facilitate the deployment of web shells or malware, enabling attackers to maintain long-term access or launch further attacks within the network. The criticality of this vulnerability necessitates immediate attention to prevent exploitation that could cascade into broader organizational security incidents.

Mitigation Recommendations

1. Immediate mitigation should include restricting or disabling the use of the Premio Folders plugin until a vendor patch is released. 2. Implement strict file upload controls at the web server or application firewall level, such as blocking executable file types (e.g., .php, .exe, .js) from being uploaded or executed within the media directories. 3. Enforce the principle of least privilege by ensuring that only trusted administrators have the capability to upload files or manage folders within WordPress. 4. Monitor web server logs and WordPress activity logs for unusual file upload patterns or access to suspicious files. 5. Deploy a Web Application Firewall (WAF) with custom rules to detect and block attempts to upload or access malicious files. 6. Conduct regular security audits and vulnerability scans focusing on WordPress plugins and themes to identify and remediate similar risks. 7. Prepare incident response plans specifically addressing web shell detection and removal, as well as recovery procedures for compromised WordPress instances. 8. Educate administrators on the risks of plugin vulnerabilities and the importance of timely updates and patch management.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2023-08-10T11:31:18.459Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d983dc4522896dcbef278

Added to database: 5/21/2025, 9:09:17 AM

Last enriched: 6/24/2025, 10:49:17 PM

Last updated: 7/31/2025, 1:33:41 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats