Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-3234: CWE-434 Unrestricted Upload of File with Dangerous Type in ninjateam File Manager Pro – Filester

0
High
VulnerabilityCVE-2025-3234cvecve-2025-3234cwe-434
Published: Sat Jun 14 2025 (06/14/2025, 05:32:01 UTC)
Source: CVE Database V5
Vendor/Project: ninjateam
Product: File Manager Pro – Filester

Description

The File Manager Pro – Filester plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in all versions up to, and including, 1.8.8. This makes it possible for authenticated attackers, with Administrator-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. Administrators have the ability to extend file manager usage privileges to lower-level users including subscribers, which would make this vulnerability more severe on such sites.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 13:25:24 UTC

Technical Analysis

CVE-2025-3234 is a vulnerability identified in the File Manager Pro – Filester plugin for WordPress, affecting all versions up to 1.8.8. The core issue is the absence of proper file type validation during file uploads, categorized under CWE-434 (Unrestricted Upload of File with Dangerous Type). Authenticated attackers with Administrator-level access or higher can exploit this flaw to upload arbitrary files to the web server hosting the WordPress site. This can enable remote code execution (RCE), allowing attackers to execute malicious code remotely, potentially taking full control of the server environment. The plugin allows administrators to delegate file manager privileges to lower-privileged users such as subscribers, which can significantly increase the attack surface and severity if such delegation is in place. The vulnerability has a CVSS 3.1 base score of 7.2, reflecting high severity, with attack vector being network-based, low attack complexity, requiring high privileges but no user interaction, and impacting confidentiality, integrity, and availability. No patches or official fixes have been published yet, and no known exploits are reported in the wild. The vulnerability is critical for WordPress sites using this plugin, especially those with multiple users and delegated permissions, as it can lead to full server compromise.

Potential Impact

The impact of CVE-2025-3234 is significant for organizations running WordPress sites with the File Manager Pro – Filester plugin. Successful exploitation can lead to remote code execution, allowing attackers to execute arbitrary commands, deploy malware, or pivot within the network. This compromises confidentiality by exposing sensitive data, integrity by allowing unauthorized modifications, and availability by potentially disrupting services. Organizations with delegated file manager privileges to lower-level users face increased risk, as attackers with less privileged accounts could escalate their capabilities. The vulnerability threatens websites’ operational continuity, reputation, and compliance posture, especially for businesses relying on WordPress for e-commerce, content management, or customer engagement. Attackers could leverage this flaw to establish persistent backdoors, launch further attacks, or exfiltrate data. The lack of known exploits in the wild currently reduces immediate risk but does not diminish the urgency for remediation given the ease of exploitation by authenticated users.

Mitigation Recommendations

To mitigate CVE-2025-3234, organizations should immediately review and restrict file manager privileges, ensuring only trusted administrators have upload capabilities. Avoid delegating file upload permissions to lower-privileged users until a patch is available. Implement strict access controls and monitor user activities related to file uploads. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious file upload patterns, especially executable file types. Regularly audit the plugin version and update to a patched release as soon as it is published by the vendor. In the interim, consider disabling the File Manager Pro – Filester plugin if file upload functionality is not critical. Conduct thorough server and website scans for unauthorized files or web shells. Additionally, enforce server-side restrictions on executable file types and permissions to limit the impact of any uploaded malicious files. Maintain robust backups and incident response plans to recover quickly if exploitation occurs.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-04-03T18:14:00.849Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 684d0d64a8c9212743816dc3

Added to database: 6/14/2025, 5:49:24 AM

Last enriched: 2/27/2026, 1:25:24 PM

Last updated: 3/24/2026, 12:05:55 AM

Views: 122

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses