CVE-2024-12331: CWE-862 Missing Authorization in ninjateam File Manager Pro – Filester
CVE-2024-12331 is a medium severity vulnerability in the File Manager Pro – Filester WordPress plugin affecting all versions up to 1. 8. 6. It arises from a missing authorization check in the 'ajax_install_plugin' function, allowing authenticated users with Subscriber-level access or higher to install the Filebird plugin without proper permissions. This flaw does not impact confidentiality or availability but allows unauthorized modification of plugin installations, potentially leading to privilege escalation or further compromise. Exploitation requires authentication but no user interaction beyond login. No known exploits are currently in the wild. Organizations using this plugin should apply patches or implement strict access controls to mitigate risk. Countries with significant WordPress usage and large WordPress plugin ecosystems are most at risk. The CVSS score is 4.
AI Analysis
Technical Summary
CVE-2024-12331 is a vulnerability classified under CWE-862 (Missing Authorization) found in the File Manager Pro – Filester plugin for WordPress, affecting all versions up to and including 1.8.6. The root cause is the absence of a capability check in the 'ajax_install_plugin' function, which is responsible for installing plugins via AJAX requests. This missing authorization allows any authenticated user with at least Subscriber-level privileges to invoke this function and install the Filebird plugin without proper permissions. Since Subscriber-level users typically have minimal privileges, this vulnerability effectively elevates their ability to modify the WordPress environment by adding plugins, which could be leveraged for further attacks such as privilege escalation, persistence, or code execution if the installed plugin is malicious or vulnerable. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network. The CVSS v3.1 base score is 4.3, indicating medium severity, with the vector reflecting network attack vector, low attack complexity, low privileges required, no user interaction, unchanged scope, no confidentiality impact, limited integrity impact, and no availability impact. No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability was published on December 19, 2024, and was assigned by Wordfence. The lack of authorization checks is a common security oversight that can lead to unauthorized modifications and potential compromise of WordPress sites using this plugin.
Potential Impact
The primary impact of CVE-2024-12331 is unauthorized modification of the WordPress environment by users with Subscriber-level access or higher. This can lead to the installation of additional plugins without administrative approval, potentially enabling privilege escalation, persistence mechanisms, or introduction of malicious code if the installed plugins are compromised or malicious. While confidentiality and availability are not directly affected, the integrity of the WordPress site is at risk. Organizations relying on this plugin may face increased risk of site defacement, data manipulation, or further exploitation through chained vulnerabilities. The vulnerability could be exploited by insider threats or compromised low-privilege accounts. Given WordPress's widespread use globally, especially in small to medium businesses and content-driven sites, the threat surface is significant. However, the requirement for authenticated access limits exploitation to environments where user accounts are not tightly controlled or where attackers have obtained credentials.
Mitigation Recommendations
To mitigate CVE-2024-12331, organizations should immediately restrict Subscriber-level user capabilities to the minimum necessary and audit existing user accounts for suspicious activity or privilege misuse. Administrators should monitor plugin installation activities and implement logging and alerting for unauthorized plugin installations. Since no official patch is currently linked, consider temporarily disabling or removing the File Manager Pro – Filester plugin until a fix is released. Employ web application firewalls (WAFs) with custom rules to detect and block unauthorized AJAX requests targeting the 'ajax_install_plugin' function. Additionally, enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of compromised low-privilege accounts. Regularly update WordPress core and plugins to the latest versions once patches become available. Conduct security awareness training to minimize credential compromise risks. Finally, consider isolating WordPress administrative interfaces behind VPNs or IP allowlists to reduce exposure.
Affected Countries
United States, Germany, United Kingdom, India, Brazil, Canada, Australia, France, Japan, Netherlands
CVE-2024-12331: CWE-862 Missing Authorization in ninjateam File Manager Pro – Filester
Description
CVE-2024-12331 is a medium severity vulnerability in the File Manager Pro – Filester WordPress plugin affecting all versions up to 1. 8. 6. It arises from a missing authorization check in the 'ajax_install_plugin' function, allowing authenticated users with Subscriber-level access or higher to install the Filebird plugin without proper permissions. This flaw does not impact confidentiality or availability but allows unauthorized modification of plugin installations, potentially leading to privilege escalation or further compromise. Exploitation requires authentication but no user interaction beyond login. No known exploits are currently in the wild. Organizations using this plugin should apply patches or implement strict access controls to mitigate risk. Countries with significant WordPress usage and large WordPress plugin ecosystems are most at risk. The CVSS score is 4.
AI-Powered Analysis
Technical Analysis
CVE-2024-12331 is a vulnerability classified under CWE-862 (Missing Authorization) found in the File Manager Pro – Filester plugin for WordPress, affecting all versions up to and including 1.8.6. The root cause is the absence of a capability check in the 'ajax_install_plugin' function, which is responsible for installing plugins via AJAX requests. This missing authorization allows any authenticated user with at least Subscriber-level privileges to invoke this function and install the Filebird plugin without proper permissions. Since Subscriber-level users typically have minimal privileges, this vulnerability effectively elevates their ability to modify the WordPress environment by adding plugins, which could be leveraged for further attacks such as privilege escalation, persistence, or code execution if the installed plugin is malicious or vulnerable. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network. The CVSS v3.1 base score is 4.3, indicating medium severity, with the vector reflecting network attack vector, low attack complexity, low privileges required, no user interaction, unchanged scope, no confidentiality impact, limited integrity impact, and no availability impact. No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability was published on December 19, 2024, and was assigned by Wordfence. The lack of authorization checks is a common security oversight that can lead to unauthorized modifications and potential compromise of WordPress sites using this plugin.
Potential Impact
The primary impact of CVE-2024-12331 is unauthorized modification of the WordPress environment by users with Subscriber-level access or higher. This can lead to the installation of additional plugins without administrative approval, potentially enabling privilege escalation, persistence mechanisms, or introduction of malicious code if the installed plugins are compromised or malicious. While confidentiality and availability are not directly affected, the integrity of the WordPress site is at risk. Organizations relying on this plugin may face increased risk of site defacement, data manipulation, or further exploitation through chained vulnerabilities. The vulnerability could be exploited by insider threats or compromised low-privilege accounts. Given WordPress's widespread use globally, especially in small to medium businesses and content-driven sites, the threat surface is significant. However, the requirement for authenticated access limits exploitation to environments where user accounts are not tightly controlled or where attackers have obtained credentials.
Mitigation Recommendations
To mitigate CVE-2024-12331, organizations should immediately restrict Subscriber-level user capabilities to the minimum necessary and audit existing user accounts for suspicious activity or privilege misuse. Administrators should monitor plugin installation activities and implement logging and alerting for unauthorized plugin installations. Since no official patch is currently linked, consider temporarily disabling or removing the File Manager Pro – Filester plugin until a fix is released. Employ web application firewalls (WAFs) with custom rules to detect and block unauthorized AJAX requests targeting the 'ajax_install_plugin' function. Additionally, enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of compromised low-privilege accounts. Regularly update WordPress core and plugins to the latest versions once patches become available. Conduct security awareness training to minimize credential compromise risks. Finally, consider isolating WordPress administrative interfaces behind VPNs or IP allowlists to reduce exposure.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-12-06T22:02:01.509Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e37b7ef31ef0b597ef6
Added to database: 2/25/2026, 9:48:39 PM
Last enriched: 2/26/2026, 5:16:31 AM
Last updated: 2/26/2026, 9:38:22 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighCVE-2026-28083: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in UX-themes Flatsome
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.