Home

Description

Several WordPress plugins using elFinder versions 2.1.64 and prior are vulnerable to Directory Traversal in various versions. This makes it possible for unauthenticated attackers to delete arbitrary files. Successful exploitation of this vulnerability requires a site owner to explicitly make an instance of the file manager available to users.

PUBLISHED Reserved 2025-01-28 | Published 2025-08-13 | Updated 2025-08-13 | Assigner Wordfence




MEDIUM: 6.5CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L

Problem types

CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')

Product status

Default status
unaffected

*
affected

Default status
unaffected

*
affected

Default status
unaffected

*
affected

Timeline

2025-01-28:Vendor Notified
2025-08-12:Disclosed

Credits

Kevin Wydler finder

References

www.wordfence.com/...-3bdf-4883-91ba-655f2757c53b?source=cve

github.com/Studio-42/elFinder

plugins.trac.wordpress.org/...unk/lib/php/elFinder.class.php

plugins.trac.wordpress.org/...library/php/elFinder.class.php

plugins.trac.wordpress.org/...ger/lib/php/elFinder.class.php

github.com/...42/elFinder/blob/master/php/elFinder.class.php

plugins.trac.wordpress.org/changeset/3319016/filester

plugins.trac.wordpress.org/...library/php/elFinder.class.php

cve.org (CVE-2025-0818)

nvd.nist.gov (CVE-2025-0818)

Download JSON