Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13333: CWE-434 Unrestricted Upload of File with Dangerous Type in saadiqbal Advanced File Manager — Ultimate WordPress File Manager and Document Library Plugin

0
High
VulnerabilityCVE-2024-13333cvecve-2024-13333cwe-434
Published: Fri Jan 17 2025 (01/17/2025, 05:29:27 UTC)
Source: CVE Database V5
Vendor/Project: saadiqbal
Product: Advanced File Manager — Ultimate WordPress File Manager and Document Library Plugin

Description

The Advanced File Manager plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the 'fma_local_file_system' function in versions 5.2.12 to 5.2.13. This makes it possible for authenticated attackers, with Subscriber-level access and above and upload permissions granted by an administrator, to upload arbitrary files on the affected site's server which may make remote code execution possible. The function can be exploited only if the "Display .htaccess?" setting is enabled.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 01:41:29 UTC

Technical Analysis

The Advanced File Manager — Ultimate WordPress File Manager and Document Library Plugin, specifically versions 5.2.12 and 5.2.13, contains a critical vulnerability identified as CVE-2024-13333. This vulnerability arises from the 'fma_local_file_system' function, which lacks proper validation of uploaded file types, classified under CWE-434 (Unrestricted Upload of File with Dangerous Type). Authenticated users with at least Subscriber-level access and upload permissions granted by an administrator can exploit this flaw to upload arbitrary files to the server hosting the WordPress site. The attack vector requires the plugin's "Display .htaccess?" setting to be enabled, which may expose server configuration files and facilitate exploitation. The absence of file type validation means malicious files, including web shells or scripts, can be uploaded and executed remotely, potentially leading to remote code execution (RCE). This compromises the confidentiality, integrity, and availability of the affected system. The vulnerability has a CVSS 3.1 base score of 7.5, reflecting high severity due to network attack vector, low privileges required, no user interaction, and high impact on all security properties. Although no exploits are currently known in the wild, the vulnerability poses a significant risk to WordPress sites using this plugin, especially those with multiple users and enabled upload permissions. The lack of patch links suggests a patch may not yet be available, emphasizing the need for immediate mitigation steps.

Potential Impact

The impact of CVE-2024-13333 is substantial for organizations running WordPress sites with the affected Advanced File Manager plugin versions. Exploitation can lead to remote code execution, allowing attackers to execute arbitrary commands on the server, potentially leading to full system compromise. This can result in data breaches, defacement, service disruption, or use of the compromised server as a pivot point for further attacks. The vulnerability affects confidentiality by exposing sensitive data, integrity by allowing unauthorized modifications, and availability by enabling denial-of-service conditions. Organizations with multiple users and delegated upload permissions are at higher risk, as attackers only need Subscriber-level access with upload rights. The requirement for the "Display .htaccess?" setting to be enabled limits the scope somewhat but still leaves many sites vulnerable if this setting is active. Given WordPress's widespread use globally, the potential attack surface is large, and the impact on business operations, reputation, and compliance can be severe.

Mitigation Recommendations

1. Immediately review and restrict upload permissions within the Advanced File Manager plugin, limiting them to trusted users only. 2. Disable the "Display .htaccess?" setting in the plugin configuration to prevent exploitation of this vulnerability. 3. Monitor user roles and permissions carefully, ensuring that Subscriber-level users do not have unnecessary upload rights. 4. Implement web application firewall (WAF) rules to detect and block suspicious file uploads or execution attempts targeting this plugin. 5. Regularly audit uploaded files for unauthorized or suspicious content, especially scripts or executable files. 6. If possible, temporarily disable or uninstall the Advanced File Manager plugin until a security patch is released. 7. Keep WordPress core, themes, and plugins updated and subscribe to vendor advisories for timely patch deployment. 8. Employ server-level restrictions such as disabling execution permissions in upload directories to reduce the risk of remote code execution. 9. Conduct penetration testing and vulnerability scanning focused on file upload functionalities to detect similar weaknesses. 10. Educate administrators and users about the risks of granting upload permissions and the importance of secure configuration.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-10T18:07:02.569Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e50b7ef31ef0b59cb86

Added to database: 2/25/2026, 9:49:04 PM

Last enriched: 2/26/2026, 1:41:29 AM

Last updated: 4/12/2026, 3:54:39 PM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses