Skip to main content

CVE-2023-4861: CWE-94 Improper Control of Generation of Code ('Code Injection') in Unknown File Manager Pro

High
Published: Mon Oct 16 2023 (10/16/2023, 19:39:21 UTC)
Source: CVE
Vendor/Project: Unknown
Product: File Manager Pro

Description

The File Manager Pro WordPress plugin before 1.8.1 allows admin users to upload arbitrary files, even in environments where such a user should not be able to gain full control of the server, such as a multisite installation. This leads to remote code execution.

AI-Powered Analysis

AILast updated: 06/21/2025, 21:58:29 UTC

Technical Analysis

CVE-2023-4861 is a high-severity vulnerability identified in the File Manager Pro WordPress plugin versions prior to 1.8.1. This vulnerability is classified under CWE-94, which pertains to improper control of code generation, commonly known as code injection. The flaw allows authenticated admin users to upload arbitrary files to the server, bypassing intended restrictions even in complex environments such as WordPress multisite installations where full server control should be limited. By exploiting this vulnerability, an attacker with admin privileges can upload malicious files that lead to remote code execution (RCE) on the underlying server. This means that the attacker can execute arbitrary commands or code remotely, potentially taking full control of the affected server. The CVSS v3.1 base score is 7.2, indicating a high severity level. The vector string (AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H) shows that the attack can be performed remotely over the network with low attack complexity, but requires high privileges (admin user) and no user interaction. The impact on confidentiality, integrity, and availability is high, as the attacker can fully compromise the server. Although no known exploits in the wild have been reported yet, the vulnerability poses a significant risk due to the widespread use of WordPress and the popularity of file management plugins. The absence of a patch link suggests that a fix may not have been publicly released at the time of this report, increasing the urgency for mitigation. The vulnerability is particularly dangerous in multisite environments where admin privileges are expected to have limited scope but can be escalated to full server control through this flaw.

Potential Impact

For European organizations, this vulnerability presents a serious risk, especially for those relying on WordPress for their web presence and using the File Manager Pro plugin. Successful exploitation can lead to full server compromise, resulting in data breaches, defacement, service disruption, and potential lateral movement within the network. Organizations handling sensitive personal data under GDPR could face regulatory penalties if this vulnerability is exploited. Multisite WordPress installations, common in large enterprises and managed service providers, are particularly at risk because the vulnerability bypasses expected privilege boundaries. This could lead to widespread compromise across multiple sites hosted on the same infrastructure. Additionally, the ability to execute arbitrary code remotely can facilitate deployment of ransomware, cryptominers, or other malware, amplifying operational and financial impacts. The high severity and ease of exploitation by an authenticated admin user mean that insider threats or compromised admin accounts could quickly escalate into full system breaches. Given the critical nature of web infrastructure in sectors like finance, healthcare, and government, the impact on European organizations could be substantial if timely mitigation is not applied.

Mitigation Recommendations

1. Immediate review and restriction of admin user privileges in WordPress environments using File Manager Pro, ensuring that only fully trusted personnel have such access. 2. If possible, disable or uninstall the File Manager Pro plugin until a patched version (1.8.1 or later) is available and verified. 3. Monitor file upload directories for suspicious or unauthorized files, employing file integrity monitoring tools to detect unexpected changes. 4. Implement web application firewalls (WAFs) with custom rules to block suspicious file upload patterns or execution of unauthorized scripts. 5. Enforce strict network segmentation to limit the impact of any potential compromise originating from the WordPress server. 6. Regularly audit multisite installations to verify that privilege boundaries are enforced and no unauthorized file uploads have occurred. 7. Keep WordPress core, plugins, and themes updated to the latest versions to reduce exposure to known vulnerabilities. 8. Employ multi-factor authentication (MFA) for all admin accounts to reduce the risk of credential compromise. 9. Conduct penetration testing focused on file upload and code execution vectors to identify any residual risks. 10. Prepare incident response plans specifically addressing web server compromises and remote code execution scenarios.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
WPScan
Date Reserved
2023-09-08T21:00:47.219Z
Cisa Enriched
true

Threat ID: 682d9847c4522896dcbf5368

Added to database: 5/21/2025, 9:09:27 AM

Last enriched: 6/21/2025, 9:58:29 PM

Last updated: 7/30/2025, 10:44:23 PM

Views: 18

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats