Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14804: CWE-73 External Control of File Name or Path in Frontend File Manager Plugin

0
High
VulnerabilityCVE-2025-14804cvecve-2025-14804cwe-73
Published: Wed Jan 07 2026 (01/07/2026, 06:00:09 UTC)
Source: CVE Database V5
Product: Frontend File Manager Plugin

Description

The Frontend File Manager Plugin WordPress plugin before 23.5 did not validate a path parameter and ownership of the file, allowing any authenticated users, such as subscribers to delete arbitrary files on the server

AI-Powered Analysis

AILast updated: 01/07/2026, 06:36:22 UTC

Technical Analysis

The vulnerability identified as CVE-2025-14804 affects the Frontend File Manager plugin for WordPress versions prior to 23.5. It is classified under CWE-73, which pertains to external control of file name or path. The core issue is that the plugin does not properly validate the 'path' parameter nor verify the ownership of the targeted file before allowing deletion operations. Consequently, any authenticated user, including those with minimal privileges such as subscribers, can exploit this flaw to delete arbitrary files on the server hosting the WordPress site. This can lead to significant data loss, disruption of website functionality, and potential compromise of server stability. The vulnerability requires the attacker to be authenticated but does not require elevated permissions, lowering the barrier to exploitation. No CVSS score has been assigned yet, and no known exploits are currently in the wild. The absence of patch links suggests that a fix may not have been publicly released at the time of this report. The vulnerability highlights a critical failure in access control and input validation within the plugin's file management functionality, which is a common attack vector in web applications. Organizations using this plugin should consider this a serious risk, especially if the plugin is exposed on publicly accessible WordPress sites.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial. The ability for low-privileged authenticated users to delete arbitrary files threatens the confidentiality, integrity, and availability of web assets. Data loss could include website content, configuration files, or other critical resources, potentially leading to website downtime or defacement. This can disrupt business operations, damage reputation, and incur recovery costs. Organizations in sectors relying heavily on WordPress for public-facing websites, such as e-commerce, media, and government services, are particularly vulnerable. Additionally, deletion of files could be leveraged as a stepping stone for further attacks if critical system files or logs are removed, complicating incident response. The lack of a public exploit reduces immediate risk but does not eliminate it, as attackers may develop exploits once the vulnerability is widely known. European entities with stringent data protection regulations (e.g., GDPR) may face compliance risks if the vulnerability leads to data breaches or service interruptions.

Mitigation Recommendations

Immediate mitigation steps include restricting access to the Frontend File Manager plugin to trusted users only, ideally limiting it to administrators or disabling it entirely if not essential. Organizations should implement strict role-based access controls within WordPress to prevent low-privileged users from authenticating with accounts that can access the plugin. Monitoring file system integrity and setting up alerts for unexpected file deletions can help detect exploitation attempts early. Since no official patch is currently available, organizations should follow the plugin vendor's updates closely and apply patches promptly once released. Additionally, web application firewalls (WAFs) can be configured to detect and block suspicious requests targeting the vulnerable plugin endpoints. Regular backups of website files and configurations are critical to enable rapid recovery in case of file deletion. Conducting security audits and penetration testing focused on plugin vulnerabilities can further reduce risk exposure.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
WPScan
Date Reserved
2025-12-16T21:54:07.344Z
Cvss Version
null
State
PUBLISHED

Threat ID: 695dfb8aa55ed4ed9983420a

Added to database: 1/7/2026, 6:22:02 AM

Last enriched: 1/7/2026, 6:36:22 AM

Last updated: 1/8/2026, 7:34:45 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats