Skip to main content

CVE-2024-13914: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in WP Experts File Manager Advanced Shortcode

High
VulnerabilityCVE-2024-13914cvecve-2024-13914cwe-22
Published: Thu May 15 2025 (05/15/2025, 05:22:57 UTC)
Source: CVE
Vendor/Project: WP Experts
Product: File Manager Advanced Shortcode

Description

The File Manager Advanced Shortcode WordPress plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.5.4 (file-manager-advanced-shortcode) and 2.5.6 (advanced-file-manager-pro-premium), via the 'file_manager_advanced' shortcode. This makes it possible for authenticated attackers, with Administrator-level access and above, to include and execute arbitrary JavaScript files on the server. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included. Sites currently using 2.5.4 (file-manager-advanced-shortcode) should be updated to 2.6.0 (advanced-file-manager-pro-premium).

AI-Powered Analysis

AILast updated: 07/06/2025, 10:10:48 UTC

Technical Analysis

CVE-2024-13914 is a high-severity vulnerability affecting the WordPress plugin 'File Manager Advanced Shortcode' developed by WP Experts. The flaw is categorized as CWE-22, which refers to improper limitation of a pathname to a restricted directory, commonly known as a path traversal vulnerability. This vulnerability exists in all versions up to and including 2.5.4 of the 'file-manager-advanced-shortcode' and 2.5.6 of 'advanced-file-manager-pro-premium'. The issue arises through the 'file_manager_advanced' shortcode, which allows authenticated users with Administrator-level privileges or higher to perform Local File Inclusion (LFI). Exploiting this vulnerability enables attackers to include and execute arbitrary JavaScript files on the server. This can lead to bypassing access controls, unauthorized access to sensitive data, and potentially full code execution if attackers upload and include files disguised as safe types such as images. The vulnerability does not require user interaction beyond authentication, but it does require high privileges (admin or above). The CVSS v3.1 base score is 7.2, reflecting high severity with network attack vector, low attack complexity, high privileges required, no user interaction, and impacts on confidentiality, integrity, and availability. No known exploits are currently reported in the wild, but the risk is significant given the potential for code execution and data compromise. The recommended remediation is to update affected installations to version 2.6.0 of the plugin, where the vulnerability has been fixed.

Potential Impact

For European organizations, this vulnerability poses a serious risk, especially for those relying on WordPress websites with the affected plugin installed. Compromise could lead to unauthorized access to sensitive customer data, intellectual property, or internal systems, potentially violating GDPR and other data protection regulations. The ability to execute arbitrary JavaScript on the server could facilitate further attacks such as web shell deployment, lateral movement, or persistent backdoors. This could disrupt business operations, damage reputation, and incur regulatory penalties. Organizations in sectors with high web presence such as e-commerce, media, and government are particularly vulnerable. Since exploitation requires administrator-level access, the threat is heightened if internal accounts are compromised or if attackers gain admin credentials through phishing or other means. The vulnerability's network accessibility means that once admin credentials are obtained, exploitation can be performed remotely without user interaction, increasing the attack surface.

Mitigation Recommendations

1. Immediate update of the 'File Manager Advanced Shortcode' plugin to version 2.6.0 or later, which contains the patch for this vulnerability. 2. Restrict administrator access to trusted personnel only and enforce strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 3. Conduct regular audits of WordPress plugins and remove or replace any unnecessary or outdated plugins to minimize attack surface. 4. Implement web application firewalls (WAF) with rules to detect and block path traversal attempts and suspicious shortcode usage. 5. Monitor server and application logs for unusual file inclusion activities or unexpected JavaScript execution. 6. Employ file integrity monitoring to detect unauthorized changes to plugin files or uploads. 7. Educate administrators on phishing and credential security to prevent privilege escalation. 8. Consider isolating WordPress instances and limiting file upload capabilities to reduce the impact of potential exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-03-01T00:07:02.857Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682cd0fb1484d88663aec5bf

Added to database: 5/20/2025, 6:59:07 PM

Last enriched: 7/6/2025, 10:10:48 AM

Last updated: 8/8/2025, 10:34:12 AM

Views: 14

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats