Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-8746: CWE-434 Unrestricted Upload of File with Dangerous Type in File Manager File Manager Pro

0
High
VulnerabilityCVE-2024-8746cvecve-2024-8746cwe-434
Published: Wed Oct 16 2024 (10/16/2024, 06:43:35 UTC)
Source: CVE Database V5
Vendor/Project: File Manager
Product: File Manager Pro

Description

CVE-2024-8746 is a high-severity vulnerability in the File Manager Pro WordPress plugin affecting all versions up to 8. 3. 9. It allows unauthenticated attackers, if granted access by an administrator, to upload and download arbitrary backup files due to missing file type validation in an AJAX action. This flaw can lead to remote code execution on the affected server. Exploitation requires the attacker to have access to the File Manager interface, which is typically restricted but may be granted by an admin. The vulnerability stems from CWE-434: Unrestricted Upload of File with Dangerous Type. No known exploits are currently reported in the wild. Organizations using this plugin should urgently review access controls and apply patches or mitigations once available. The CVSS score is 7.

AI-Powered Analysis

AILast updated: 02/25/2026, 22:41:08 UTC

Technical Analysis

CVE-2024-8746 is a vulnerability identified in the File Manager Pro plugin for WordPress, affecting all versions up to and including 8.3.9. The issue arises from the 'mk_file_folder_manager_shortcode' AJAX action, which lacks proper validation of file types during upload and download operations. This missing validation allows unauthenticated attackers, provided they have been granted access to the File Manager by an administrator, to upload and download arbitrary backup files on the web server hosting the WordPress site. Backup files can contain sensitive information such as database dumps, configuration files, or even executable code. By uploading malicious backup files or manipulating existing ones, attackers can potentially achieve remote code execution (RCE), compromising the server's confidentiality, integrity, and availability. The vulnerability is classified under CWE-434, which concerns unrestricted file uploads of dangerous types. The CVSS v3.1 score is 7.5 (High), reflecting network attack vector, high impact on confidentiality, integrity, and availability, no privileges required, but requiring user interaction. As of the publication date, no known exploits have been reported in the wild, but the risk remains significant due to the severity and ease of exploitation once access is granted. The vulnerability affects a widely used WordPress plugin, making it a critical concern for websites relying on File Manager Pro for file operations.

Potential Impact

The impact of CVE-2024-8746 is substantial for organizations using the File Manager Pro plugin on WordPress sites. Successful exploitation can lead to unauthorized disclosure of sensitive backup files, exposing credentials, database contents, and configuration details. More critically, attackers can upload malicious files that enable remote code execution, allowing full compromise of the web server. This can result in data breaches, defacement, malware deployment, lateral movement within the network, and service disruption. Since WordPress powers a significant portion of the web, including many business, government, and e-commerce sites, the vulnerability poses a widespread risk. The requirement for attacker access to the File Manager interface somewhat limits exploitation but does not eliminate risk, especially in environments with weak access controls or compromised administrator accounts. The vulnerability could be leveraged in targeted attacks against high-value websites or used as a foothold for broader network intrusion campaigns.

Mitigation Recommendations

To mitigate CVE-2024-8746, organizations should immediately audit and restrict access to the File Manager Pro plugin, ensuring only trusted administrators have permissions. Disable or remove the plugin if it is not essential. Monitor and log all file upload and download activities within the plugin to detect suspicious behavior. Apply any available patches or updates from the vendor promptly once released. In the absence of patches, implement web application firewall (WAF) rules to block unauthorized AJAX requests to 'mk_file_folder_manager_shortcode' or restrict this endpoint to trusted IP addresses. Conduct regular security reviews of WordPress plugins and their configurations. Educate administrators on the risks of granting plugin access and enforce strong authentication mechanisms such as multi-factor authentication (MFA). Additionally, isolate WordPress hosting environments to limit the impact of potential compromises and maintain regular backups stored securely offline.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-09-12T01:57:09.799Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b30b7ef31ef0b54f245

Added to database: 2/25/2026, 9:35:44 PM

Last enriched: 2/25/2026, 10:41:08 PM

Last updated: 2/26/2026, 9:43:55 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats