CVE-2024-11391: CWE-434 Unrestricted Upload of File with Dangerous Type in modalweb Advanced File Manager
CVE-2024-11391 is a high-severity vulnerability in the modalweb Advanced File Manager WordPress plugin allowing authenticated users with Subscriber-level access or higher, granted permissions by an Administrator, to upload arbitrary files due to missing file type validation. This unrestricted file upload can lead to remote code execution on the affected server. The vulnerability exists in all versions up to and including 5. 2. 10, specifically in the 'class_fma_connector. php' file. Exploitation requires authentication with low privileges but no user interaction beyond that. The CVSS score is 7. 5, reflecting high impact on confidentiality, integrity, and availability, with a network attack vector and high complexity. No known exploits are currently reported in the wild.
AI Analysis
Technical Summary
CVE-2024-11391 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting the Advanced File Manager plugin for WordPress developed by modalweb. The flaw arises from insufficient validation of uploaded file types in the 'class_fma_connector.php' component, allowing authenticated users with Subscriber-level access or higher—provided they have permissions granted by an Administrator—to upload arbitrary files to the web server. This unrestricted file upload can be exploited to place malicious scripts or executables on the server, potentially enabling remote code execution (RCE). The vulnerability affects all plugin versions up to 5.2.10. The attack vector is network-based, requiring authentication but no user interaction beyond login. The CVSS v3.1 score of 7.5 indicates a high-severity issue with significant impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the nature of the vulnerability makes it a critical risk for WordPress sites using this plugin, especially those with multiple users having elevated permissions. The vulnerability's root cause is the lack of proper file type validation and sanitization during the upload process, which is a common security oversight in web applications handling file uploads.
Potential Impact
The impact of CVE-2024-11391 is substantial for organizations running WordPress sites with the Advanced File Manager plugin. Successful exploitation can lead to remote code execution, allowing attackers to execute arbitrary commands on the server, potentially leading to full site compromise, data theft, defacement, or use of the server as a pivot point for further attacks within the network. Confidentiality is at risk due to unauthorized access to sensitive files or data. Integrity can be compromised by altering website content or injecting malicious code. Availability may be affected if attackers disrupt services or deploy ransomware. Since exploitation requires only low-level authenticated access with permissions granted by an Administrator, insider threats or compromised accounts pose a significant risk. The vulnerability can be leveraged in targeted attacks against organizations with multiple WordPress users or weak access controls, increasing the attack surface. The absence of known exploits in the wild currently limits immediate widespread impact but does not reduce the urgency for remediation.
Mitigation Recommendations
To mitigate CVE-2024-11391, organizations should immediately audit user roles and permissions within WordPress, ensuring that Subscriber-level users do not have unnecessary upload permissions granted by Administrators. Restrict file upload capabilities strictly to trusted users and roles. Monitor and log file upload activities for suspicious behavior. Until an official patch is released, consider disabling or removing the Advanced File Manager plugin if it is not essential. If the plugin is critical, implement web application firewall (WAF) rules to block suspicious file upload attempts and restrict execution permissions on upload directories to prevent execution of uploaded files. Employ file integrity monitoring to detect unauthorized changes. Regularly update WordPress core and plugins to the latest versions once a patch addressing this vulnerability is available. Additionally, educate administrators on the risks of granting upload permissions and enforce the principle of least privilege. Conduct penetration testing focusing on file upload functionality to verify the effectiveness of mitigations.
Affected Countries
United States, United Kingdom, Germany, France, Canada, Australia, India, Brazil, Japan, Netherlands, Italy, Spain
CVE-2024-11391: CWE-434 Unrestricted Upload of File with Dangerous Type in modalweb Advanced File Manager
Description
CVE-2024-11391 is a high-severity vulnerability in the modalweb Advanced File Manager WordPress plugin allowing authenticated users with Subscriber-level access or higher, granted permissions by an Administrator, to upload arbitrary files due to missing file type validation. This unrestricted file upload can lead to remote code execution on the affected server. The vulnerability exists in all versions up to and including 5. 2. 10, specifically in the 'class_fma_connector. php' file. Exploitation requires authentication with low privileges but no user interaction beyond that. The CVSS score is 7. 5, reflecting high impact on confidentiality, integrity, and availability, with a network attack vector and high complexity. No known exploits are currently reported in the wild.
AI-Powered Analysis
Technical Analysis
CVE-2024-11391 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) affecting the Advanced File Manager plugin for WordPress developed by modalweb. The flaw arises from insufficient validation of uploaded file types in the 'class_fma_connector.php' component, allowing authenticated users with Subscriber-level access or higher—provided they have permissions granted by an Administrator—to upload arbitrary files to the web server. This unrestricted file upload can be exploited to place malicious scripts or executables on the server, potentially enabling remote code execution (RCE). The vulnerability affects all plugin versions up to 5.2.10. The attack vector is network-based, requiring authentication but no user interaction beyond login. The CVSS v3.1 score of 7.5 indicates a high-severity issue with significant impact on confidentiality, integrity, and availability. Although no public exploits have been reported yet, the nature of the vulnerability makes it a critical risk for WordPress sites using this plugin, especially those with multiple users having elevated permissions. The vulnerability's root cause is the lack of proper file type validation and sanitization during the upload process, which is a common security oversight in web applications handling file uploads.
Potential Impact
The impact of CVE-2024-11391 is substantial for organizations running WordPress sites with the Advanced File Manager plugin. Successful exploitation can lead to remote code execution, allowing attackers to execute arbitrary commands on the server, potentially leading to full site compromise, data theft, defacement, or use of the server as a pivot point for further attacks within the network. Confidentiality is at risk due to unauthorized access to sensitive files or data. Integrity can be compromised by altering website content or injecting malicious code. Availability may be affected if attackers disrupt services or deploy ransomware. Since exploitation requires only low-level authenticated access with permissions granted by an Administrator, insider threats or compromised accounts pose a significant risk. The vulnerability can be leveraged in targeted attacks against organizations with multiple WordPress users or weak access controls, increasing the attack surface. The absence of known exploits in the wild currently limits immediate widespread impact but does not reduce the urgency for remediation.
Mitigation Recommendations
To mitigate CVE-2024-11391, organizations should immediately audit user roles and permissions within WordPress, ensuring that Subscriber-level users do not have unnecessary upload permissions granted by Administrators. Restrict file upload capabilities strictly to trusted users and roles. Monitor and log file upload activities for suspicious behavior. Until an official patch is released, consider disabling or removing the Advanced File Manager plugin if it is not essential. If the plugin is critical, implement web application firewall (WAF) rules to block suspicious file upload attempts and restrict execution permissions on upload directories to prevent execution of uploaded files. Employ file integrity monitoring to detect unauthorized changes. Regularly update WordPress core and plugins to the latest versions once a patch addressing this vulnerability is available. Additionally, educate administrators on the risks of granting upload permissions and enforce the principle of least privilege. Conduct penetration testing focusing on file upload functionality to verify the effectiveness of mitigations.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-11-18T22:42:04.474Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e12b7ef31ef0b594a78
Added to database: 2/25/2026, 9:48:02 PM
Last enriched: 2/26/2026, 7:11:31 AM
Last updated: 2/26/2026, 8:07:46 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.