Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12331: CWE-862 Missing Authorization in ninjateam File Manager Pro – Filester

0
Medium
VulnerabilityCVE-2024-12331cvecve-2024-12331cwe-862
Published: Thu Dec 19 2024 (12/19/2024, 11:14:14 UTC)
Source: CVE Database V5
Vendor/Project: ninjateam
Product: File Manager Pro – Filester

Description

CVE-2024-12331 is a medium severity vulnerability in the File Manager Pro – Filester WordPress plugin affecting all versions up to 1. 8. 6. It arises from a missing authorization check in the 'ajax_install_plugin' function, allowing authenticated users with Subscriber-level access or higher to install the Filebird plugin without proper permissions. This flaw does not impact confidentiality or availability but allows unauthorized modification of plugin installations, potentially leading to privilege escalation or further compromise. Exploitation requires authentication but no user interaction beyond login. No known exploits are currently in the wild. Organizations using this plugin should apply patches or implement strict access controls to mitigate risk. Countries with significant WordPress usage and large WordPress plugin ecosystems are most at risk. The CVSS score is 4.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:16:31 UTC

Technical Analysis

CVE-2024-12331 is a vulnerability classified under CWE-862 (Missing Authorization) found in the File Manager Pro – Filester plugin for WordPress, affecting all versions up to and including 1.8.6. The root cause is the absence of a capability check in the 'ajax_install_plugin' function, which is responsible for installing plugins via AJAX requests. This missing authorization allows any authenticated user with at least Subscriber-level privileges to invoke this function and install the Filebird plugin without proper permissions. Since Subscriber-level users typically have minimal privileges, this vulnerability effectively elevates their ability to modify the WordPress environment by adding plugins, which could be leveraged for further attacks such as privilege escalation, persistence, or code execution if the installed plugin is malicious or vulnerable. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network. The CVSS v3.1 base score is 4.3, indicating medium severity, with the vector reflecting network attack vector, low attack complexity, low privileges required, no user interaction, unchanged scope, no confidentiality impact, limited integrity impact, and no availability impact. No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability was published on December 19, 2024, and was assigned by Wordfence. The lack of authorization checks is a common security oversight that can lead to unauthorized modifications and potential compromise of WordPress sites using this plugin.

Potential Impact

The primary impact of CVE-2024-12331 is unauthorized modification of the WordPress environment by users with Subscriber-level access or higher. This can lead to the installation of additional plugins without administrative approval, potentially enabling privilege escalation, persistence mechanisms, or introduction of malicious code if the installed plugins are compromised or malicious. While confidentiality and availability are not directly affected, the integrity of the WordPress site is at risk. Organizations relying on this plugin may face increased risk of site defacement, data manipulation, or further exploitation through chained vulnerabilities. The vulnerability could be exploited by insider threats or compromised low-privilege accounts. Given WordPress's widespread use globally, especially in small to medium businesses and content-driven sites, the threat surface is significant. However, the requirement for authenticated access limits exploitation to environments where user accounts are not tightly controlled or where attackers have obtained credentials.

Mitigation Recommendations

To mitigate CVE-2024-12331, organizations should immediately restrict Subscriber-level user capabilities to the minimum necessary and audit existing user accounts for suspicious activity or privilege misuse. Administrators should monitor plugin installation activities and implement logging and alerting for unauthorized plugin installations. Since no official patch is currently linked, consider temporarily disabling or removing the File Manager Pro – Filester plugin until a fix is released. Employ web application firewalls (WAFs) with custom rules to detect and block unauthorized AJAX requests targeting the 'ajax_install_plugin' function. Additionally, enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of compromised low-privilege accounts. Regularly update WordPress core and plugins to the latest versions once patches become available. Conduct security awareness training to minimize credential compromise risks. Finally, consider isolating WordPress administrative interfaces behind VPNs or IP allowlists to reduce exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-06T22:02:01.509Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e37b7ef31ef0b597ef6

Added to database: 2/25/2026, 9:48:39 PM

Last enriched: 2/26/2026, 5:16:31 AM

Last updated: 2/26/2026, 9:38:22 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats