Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1280: CWE-862 Missing Authorization in nmedia Frontend File Manager Plugin

0
High
VulnerabilityCVE-2026-1280cvecve-2026-1280cwe-862
Published: Wed Jan 28 2026 (01/28/2026, 11:23:41 UTC)
Source: CVE Database V5
Vendor/Project: nmedia
Product: Frontend File Manager Plugin

Description

The Frontend File Manager Plugin for WordPress is vulnerable to unauthorized file sharing due to a missing capability check on the 'wpfm_send_file_in_email' AJAX action in all versions up to, and including, 23.5. This makes it possible for unauthenticated attackers to share arbitrary uploaded files via email by supplying a file ID. Since file IDs are sequential integers, attackers can enumerate all uploaded files on the site and exfiltrate sensitive data that was intended to be restricted to administrators only.

AI-Powered Analysis

AILast updated: 01/28/2026, 11:50:18 UTC

Technical Analysis

CVE-2026-1280 is a vulnerability classified under CWE-862 (Missing Authorization) affecting all versions of the nmedia Frontend File Manager Plugin for WordPress up to and including version 23.5. The vulnerability stems from the absence of a capability check on the AJAX action 'wpfm_send_file_in_email', which is responsible for sending uploaded files via email. Because this action lacks authorization verification, unauthenticated attackers can invoke it by supplying a file ID parameter. File IDs are assigned as sequential integers, enabling attackers to enumerate all uploaded files on the WordPress site. This enumeration allows attackers to identify and exfiltrate sensitive files that should be restricted to administrators only. The vulnerability has a CVSS 3.1 base score of 7.5, reflecting high severity due to its network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact is primarily on confidentiality, as attackers can access and share sensitive files without authorization. There is no indication of known exploits in the wild or available patches at the time of publication. The vulnerability affects any WordPress site using the Frontend File Manager Plugin, which is commonly used to manage file uploads and sharing on websites. The lack of authorization checks represents a critical security oversight that can lead to data leakage and potential compliance violations.

Potential Impact

For European organizations, the impact of CVE-2026-1280 is significant, particularly for those relying on WordPress sites with the nmedia Frontend File Manager Plugin installed. Unauthorized file sharing can lead to exposure of sensitive corporate data, intellectual property, or personal data protected under GDPR, resulting in legal and financial repercussions. Confidentiality breaches may also damage organizational reputation and customer trust. Since the vulnerability allows unauthenticated remote exploitation without user interaction, attackers can automate file enumeration and exfiltration at scale. This risk is heightened for sectors handling sensitive information such as finance, healthcare, legal, and government institutions. Additionally, organizations with public-facing WordPress sites are more exposed, as the attack vector is network-based and does not require authentication. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially as exploit code could be developed rapidly given the straightforward nature of the vulnerability. Overall, the vulnerability poses a high risk to data confidentiality and compliance for European entities using the affected plugin.

Mitigation Recommendations

1. Immediately disable or restrict access to the 'wpfm_send_file_in_email' AJAX action within the plugin or via WordPress hooks to prevent unauthenticated use. 2. Implement strict file access controls on the server side, ensuring that uploaded files are only accessible to authorized users and not exposed via predictable identifiers. 3. Monitor web server and WordPress logs for unusual AJAX requests targeting file IDs or mass enumeration patterns. 4. Employ Web Application Firewalls (WAFs) with custom rules to block suspicious requests attempting to exploit this vulnerability. 5. Regularly audit installed WordPress plugins and remove or replace those that are unmaintained or have known security issues. 6. Stay updated with the plugin vendor’s announcements and apply official patches promptly once released. 7. Conduct internal security awareness to inform site administrators about the risks of unauthorized file sharing and encourage secure file management practices. 8. Consider implementing multi-factor authentication and least privilege principles for WordPress administrative accounts to reduce overall site risk. 9. If possible, obfuscate or randomize file identifiers to prevent easy enumeration. 10. Backup critical data regularly to enable recovery in case of data loss or compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-20T22:17:51.761Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6979f49d4623b1157cb3651a

Added to database: 1/28/2026, 11:35:57 AM

Last enriched: 1/28/2026, 11:50:18 AM

Last updated: 2/6/2026, 6:38:25 PM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats