WordPress Frontend File Manager Plugin <= 23.5 is vulnerable to Content Injection

Low priority No impactful threat
<= 23.5Vulnerable version(s)
No official fix availableFixed version
4 Jul, 2025 by Patchstack

Get the fastest vulnerability mitigation with Patchstack!

Get started

Risks

CVSS 4.6

User Interaction Required

While this vulnerability can be initiated by the role shown in "Required Privilege", successful exploitation requires a privileged user to perform an action — such as clicking a malicious link, visiting a crafted page, or submitting a form.

4.6

Content Injection

This could allow a malicious actor to inject their own content into pages and posts of your website. This could also be abused to inject phishing pages into your website.

CVSS score is a way to evaluate and rank reported vulnerabilities in a standardized and repeatable way but which is not ideal for WordPress.

Solutions

This security issue has a low severity impact and is unlikely to be exploited.

Details

Have additional information or questions about this entry? Let us know.

Timeline

Reported byProfile ImagePARK_Gyun_Deuk

4 Jun, 2025

Early warning sent out to Patchstack customers

4 Jul, 2025

Published by Patchstack

4 Jul, 2025

Weekly WordPress security intelligence delivered to your inbox.