Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-8066: CWE-434 Unrestricted Upload of File with Dangerous Type in ninjateam File Manager Pro – Filester

0
High
VulnerabilityCVE-2024-8066cvecve-2024-8066cwe-434
Published: Thu Nov 28 2024 (11/28/2024, 08:47:31 UTC)
Source: CVE Database V5
Vendor/Project: ninjateam
Product: File Manager Pro – Filester

Description

CVE-2024-8066 is a high-severity vulnerability in the File Manager Pro – Filester WordPress plugin affecting all versions up to 1. 8. 6. It allows authenticated users with Subscriber-level access or higher, granted permissions by an Administrator, to upload arbitrary files due to missing validation in the 'fsConnector' function. Attackers can upload a malicious . htaccess file, enabling further arbitrary file uploads and potentially remote code execution on the server. Exploitation requires authentication but no user interaction beyond login. This vulnerability impacts confidentiality, integrity, and availability of affected WordPress sites. No known exploits are currently in the wild, but the risk is significant given the plugin's wide use. Organizations using this plugin should urgently review permissions and apply patches or mitigations once available.

AI-Powered Analysis

AILast updated: 02/26/2026, 03:51:31 UTC

Technical Analysis

CVE-2024-8066 is a vulnerability classified under CWE-434 (Unrestricted Upload of File with Dangerous Type) found in the File Manager Pro – Filester plugin for WordPress. The flaw exists in the 'fsConnector' function, which lacks proper validation of uploaded files. This allows authenticated attackers with at least Subscriber-level access, who have been granted upload permissions by an Administrator, to upload arbitrary files, including .htaccess files. By uploading a crafted .htaccess file, attackers can modify server behavior to permit further arbitrary file uploads, potentially leading to remote code execution (RCE). The vulnerability affects all versions up to and including 1.8.6. The CVSS v3.1 base score is 7.5, indicating high severity, with attack vector being network-based, requiring low privileges but high attack complexity, and no user interaction. The vulnerability compromises confidentiality, integrity, and availability of the affected WordPress sites. While no public exploits are known yet, the potential for exploitation is significant due to the plugin's popularity and the common use of WordPress for hosting websites. The lack of patch links suggests that a fix may not yet be publicly available, emphasizing the need for immediate mitigation by administrators.

Potential Impact

The vulnerability allows attackers to upload arbitrary files, including malicious scripts, which can lead to remote code execution on the web server. This compromises the confidentiality of sensitive data stored on the site, the integrity of website content, and the availability of the service if the attacker disrupts normal operations. Attackers could use this access to pivot within the network, deploy malware, deface websites, steal user data, or launch further attacks. Since the exploit requires only low-level authenticated access, attackers could leverage compromised or weak subscriber accounts to escalate privileges. The widespread use of WordPress and this plugin means a large number of websites globally could be affected, including corporate, governmental, and personal sites, potentially leading to significant reputational and financial damage.

Mitigation Recommendations

Administrators should immediately review and restrict permissions granted to Subscriber-level users and ensure that only trusted users have upload capabilities. Until an official patch is released, consider disabling or uninstalling the File Manager Pro – Filester plugin if feasible. Implement web application firewalls (WAFs) with rules to block suspicious file uploads, especially .htaccess files. Monitor server logs for unusual upload activity or changes to .htaccess files. Employ strict file type validation and sanitization on uploads at the server level as an additional safeguard. Regularly audit user roles and permissions to minimize the risk of privilege abuse. Keep WordPress core and all plugins updated and subscribe to vendor security advisories for timely patching once available. Consider isolating the WordPress environment using containerization or sandboxing to limit potential damage from exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-08-21T22:44:39.513Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c22b7ef31ef0b5604a5

Added to database: 2/25/2026, 9:39:46 PM

Last enriched: 2/26/2026, 3:51:31 AM

Last updated: 2/26/2026, 8:09:09 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats