Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0829: CWE-862 Missing Authorization in Frontend File Manager Plugin

0
Medium
VulnerabilityCVE-2026-0829cvecve-2026-0829cwe-862
Published: Tue Feb 17 2026 (02/17/2026, 06:00:06 UTC)
Source: CVE Database V5
Product: Frontend File Manager Plugin

Description

The Frontend File Manager Plugin WordPress plugin through 23.5 allows unauthenticated users to send emails through the site without any security checks. This lets attackers use the WordPress site as an open relay for spam or phishing emails to anyone. Attackers can also guess file IDs to access and share uploaded files without permission, exposing sensitive information.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 03:33:53 UTC

Technical Analysis

CVE-2026-0829 is a vulnerability identified in the Frontend File Manager WordPress plugin, versions up to 23.5, that results from missing authorization controls (CWE-862) in the plugin’s frontend components. This flaw allows unauthenticated users to send emails through the WordPress site without any security verification, effectively turning the site into an open mail relay. Attackers can exploit this to distribute spam or phishing emails, potentially damaging the reputation of the affected domain and facilitating broader phishing campaigns. Furthermore, the vulnerability permits attackers to guess file IDs to access and share uploaded files without permission, exposing potentially sensitive or confidential information stored on the site. The vulnerability has a CVSS v3.1 base score of 5.8, reflecting medium severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a scope change (S:C). The impact primarily affects integrity (unauthorized email sending) and confidentiality (unauthorized file access), with no direct impact on availability. No patches or known exploits have been reported at the time of publication. The vulnerability is significant because WordPress powers a large portion of the web, and plugins like Frontend File Manager are commonly used for file handling and communication. Exploitation could facilitate spam campaigns, phishing, and data breaches, undermining trust and compliance for affected organizations.

Potential Impact

The primary impact of CVE-2026-0829 is the unauthorized use of the affected WordPress site as an open mail relay, which can lead to widespread spam and phishing campaigns originating from legitimate domains, damaging domain reputation and potentially causing email blacklisting. This can disrupt legitimate email communications and harm organizational credibility. Additionally, the ability to guess file IDs and access uploaded files without authorization risks exposure of sensitive or confidential information, leading to data breaches and compliance violations (e.g., GDPR, HIPAA). While availability is not directly impacted, the reputational damage and potential legal consequences can be significant. Organizations relying on this plugin may face increased phishing risks, data leakage, and operational disruptions. The vulnerability’s ease of exploitation (no authentication or user interaction required) increases the likelihood of automated attacks and widespread abuse if left unmitigated.

Mitigation Recommendations

1. Immediately update the Frontend File Manager plugin to a patched version once available from the vendor or developer. 2. If no patch is available, disable or remove the plugin temporarily to prevent exploitation. 3. Implement web application firewall (WAF) rules to block suspicious email sending requests and restrict access to file management endpoints. 4. Monitor outgoing email traffic for unusual volumes or patterns indicative of relay abuse. 5. Restrict file access permissions and consider implementing additional authentication or authorization layers for file retrieval endpoints. 6. Conduct regular audits of uploaded files to detect unauthorized access or data leaks. 7. Employ rate limiting and IP reputation filtering to reduce automated guessing of file IDs. 8. Educate site administrators on the risks of using plugins without proper security controls and encourage minimal plugin usage. 9. Review email server configurations to prevent open relay conditions beyond the plugin vulnerability. 10. Maintain up-to-date backups and incident response plans to quickly recover from potential data exposure or abuse.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
WPScan
Date Reserved
2026-01-09T20:13:31.418Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69940acad1735ca73126f76a

Added to database: 2/17/2026, 6:29:30 AM

Last enriched: 4/3/2026, 3:33:53 AM

Last updated: 4/3/2026, 4:44:04 PM

Views: 135

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses