CVE-2026-1280: CWE-862 Missing Authorization in nmedia Frontend File Manager Plugin
The Frontend File Manager Plugin for WordPress is vulnerable to unauthorized file sharing due to a missing capability check on the 'wpfm_send_file_in_email' AJAX action in all versions up to, and including, 23.5. This makes it possible for unauthenticated attackers to share arbitrary uploaded files via email by supplying a file ID. Since file IDs are sequential integers, attackers can enumerate all uploaded files on the site and exfiltrate sensitive data that was intended to be restricted to administrators only.
AI Analysis
Technical Summary
The nmedia Frontend File Manager Plugin for WordPress contains a critical authorization bypass vulnerability identified as CVE-2026-1280. This vulnerability arises due to the absence of a capability check on the AJAX action 'wpfm_send_file_in_email', which is responsible for sending files via email. Since this action can be triggered without authentication, an attacker can supply a file ID parameter to send any uploaded file to an arbitrary email address. The plugin uses sequential integer file IDs, enabling attackers to enumerate all uploaded files systematically. This enumeration can lead to unauthorized disclosure of sensitive files that are supposed to be restricted to administrators. The vulnerability affects all versions up to and including 23.5. The CVSS 3.1 base score is 7.5, reflecting a network attack vector with low complexity, no privileges required, and no user interaction, resulting in high confidentiality impact but no integrity or availability impact. No patches were linked at the time of disclosure, and no active exploitation has been reported. This vulnerability represents a significant risk to confidentiality for WordPress sites using this plugin, especially those hosting sensitive or private files.
Potential Impact
The primary impact of CVE-2026-1280 is unauthorized disclosure of sensitive files stored and managed via the Frontend File Manager Plugin. Attackers can exfiltrate confidential data such as internal documents, user information, or proprietary content by enumerating file IDs and sending files to external email addresses. This breach of confidentiality can lead to data leaks, regulatory non-compliance, reputational damage, and potential financial losses. Since the vulnerability does not affect integrity or availability, the threat is limited to data exposure. The ease of exploitation—no authentication or user interaction required—makes it highly accessible to remote attackers. Organizations relying on this plugin for file management on public-facing WordPress sites are at significant risk, particularly those in regulated industries or handling sensitive information. The lack of known exploits in the wild suggests this is a newly disclosed vulnerability, but the potential for rapid exploitation is high given the straightforward attack vector.
Mitigation Recommendations
Immediate mitigation should focus on restricting access to the vulnerable AJAX action. Until an official patch is released, administrators can implement web application firewall (WAF) rules to block unauthenticated requests to 'wpfm_send_file_in_email'. Additionally, disabling or removing the Frontend File Manager Plugin if not essential can eliminate exposure. Site owners should audit uploaded files for sensitive content and consider encrypting or relocating critical files outside the plugin's management scope. Monitoring outgoing emails for suspicious activity related to file sharing is also recommended. Once a patch is available, prompt updating to the fixed plugin version is essential. Implementing strict file access controls and ensuring that all AJAX actions enforce proper capability checks can prevent similar vulnerabilities. Regular security assessments and plugin updates should be part of ongoing maintenance.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2026-1280: CWE-862 Missing Authorization in nmedia Frontend File Manager Plugin
Description
The Frontend File Manager Plugin for WordPress is vulnerable to unauthorized file sharing due to a missing capability check on the 'wpfm_send_file_in_email' AJAX action in all versions up to, and including, 23.5. This makes it possible for unauthenticated attackers to share arbitrary uploaded files via email by supplying a file ID. Since file IDs are sequential integers, attackers can enumerate all uploaded files on the site and exfiltrate sensitive data that was intended to be restricted to administrators only.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The nmedia Frontend File Manager Plugin for WordPress contains a critical authorization bypass vulnerability identified as CVE-2026-1280. This vulnerability arises due to the absence of a capability check on the AJAX action 'wpfm_send_file_in_email', which is responsible for sending files via email. Since this action can be triggered without authentication, an attacker can supply a file ID parameter to send any uploaded file to an arbitrary email address. The plugin uses sequential integer file IDs, enabling attackers to enumerate all uploaded files systematically. This enumeration can lead to unauthorized disclosure of sensitive files that are supposed to be restricted to administrators. The vulnerability affects all versions up to and including 23.5. The CVSS 3.1 base score is 7.5, reflecting a network attack vector with low complexity, no privileges required, and no user interaction, resulting in high confidentiality impact but no integrity or availability impact. No patches were linked at the time of disclosure, and no active exploitation has been reported. This vulnerability represents a significant risk to confidentiality for WordPress sites using this plugin, especially those hosting sensitive or private files.
Potential Impact
The primary impact of CVE-2026-1280 is unauthorized disclosure of sensitive files stored and managed via the Frontend File Manager Plugin. Attackers can exfiltrate confidential data such as internal documents, user information, or proprietary content by enumerating file IDs and sending files to external email addresses. This breach of confidentiality can lead to data leaks, regulatory non-compliance, reputational damage, and potential financial losses. Since the vulnerability does not affect integrity or availability, the threat is limited to data exposure. The ease of exploitation—no authentication or user interaction required—makes it highly accessible to remote attackers. Organizations relying on this plugin for file management on public-facing WordPress sites are at significant risk, particularly those in regulated industries or handling sensitive information. The lack of known exploits in the wild suggests this is a newly disclosed vulnerability, but the potential for rapid exploitation is high given the straightforward attack vector.
Mitigation Recommendations
Immediate mitigation should focus on restricting access to the vulnerable AJAX action. Until an official patch is released, administrators can implement web application firewall (WAF) rules to block unauthenticated requests to 'wpfm_send_file_in_email'. Additionally, disabling or removing the Frontend File Manager Plugin if not essential can eliminate exposure. Site owners should audit uploaded files for sensitive content and consider encrypting or relocating critical files outside the plugin's management scope. Monitoring outgoing emails for suspicious activity related to file sharing is also recommended. Once a patch is available, prompt updating to the fixed plugin version is essential. Implementing strict file access controls and ensuring that all AJAX actions enforce proper capability checks can prevent similar vulnerabilities. Regular security assessments and plugin updates should be part of ongoing maintenance.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-01-20T22:17:51.761Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6979f49d4623b1157cb3651a
Added to database: 1/28/2026, 11:35:57 AM
Last enriched: 2/26/2026, 7:02:40 PM
Last updated: 3/26/2026, 5:48:21 AM
Views: 51
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.