Description
The Frontend File Manager Plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 23.4. This is due to the plugin not validating file ownership before processing file rename requests in the '/wpfm/v1/file-rename' REST API endpoint. This makes it possible for authenticated attackers, with Subscriber-level access and above, to rename files uploaded by other users via the 'fileid' parameter.
Problem types
CWE-639 Authorization Bypass Through User-Controlled Key
Product status
* (semver)
Timeline
| 2025-11-24: | Disclosed |
Credits
Rajesh Singh
References
www.wordfence.com/...-2ae9-44b8-90b5-9fc67226855a?source=cve
plugins.trac.wordpress.org/...3.4/inc/classes/class.rest.php
plugins.trac.wordpress.org/...3.4/inc/classes/class.rest.php