CVE-2021-4350
📋 TL;DR
The Frontend File Manager WordPress plugin up to version 18.2 allows unauthenticated attackers to send emails with custom HTML content using the site's email functionality. This enables attackers to use vulnerable WordPress sites as spam relays. All WordPress sites using vulnerable versions of this plugin are affected.
💻 Affected Systems
- WordPress Frontend File Manager Plugin
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Site becomes spam relay, damaging reputation, getting blacklisted by email providers, and potentially enabling phishing campaigns.
Likely Case
Site used for spam email distribution, leading to email deliverability issues and reputation damage.
If Mitigated
Limited impact if email sending is restricted or monitored, but still represents unauthorized system use.
🎯 Exploit Status
Exploitation requires only HTTP POST requests to the vulnerable AJAX endpoint with minimal technical skill.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 18.3 or later
Vendor Advisory: https://wordpress.org/plugins/frontend-file-manager/#developers
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins. 3. Find Frontend File Manager. 4. Click Update Now or manually update to version 18.3+. 5. Verify update completed successfully.
🔧 Temporary Workarounds
Disable vulnerable AJAX endpoint
allAdd code to WordPress theme functions.php to remove the vulnerable AJAX action
add_action('init', function() { remove_action('wp_ajax_nopriv_wpfm_send_file_in_email', 'wpfm_send_file_in_email'); });
Disable plugin
allTemporarily disable the Frontend File Manager plugin until patched
🧯 If You Can't Patch
- Implement web application firewall rules to block requests to wp-admin/admin-ajax.php with wpfm_send_file_in_email action
- Monitor email sending logs for unusual activity and implement rate limiting on email functionality
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Frontend File Manager version. If version is 18.2 or lower, system is vulnerable.
Check Version:
wp plugin list --name=frontend-file-manager --field=version
Verify Fix Applied:
Verify plugin version is 18.3 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to /wp-admin/admin-ajax.php with action=wpfm_send_file_in_email
- Spike in email sending from WordPress site
Network Indicators:
- HTTP POST requests to admin-ajax.php with wpfm_send_file_in_email parameter from unauthenticated sources
SIEM Query:
source="wordpress.log" AND "admin-ajax.php" AND "wpfm_send_file_in_email"
🔗 References
- https://blog.nintechnet.com/wordpress-frontend-file-manager-plugin-fixed-multiple-critical-vulnerabilities/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/49150180-9de0-4318-b21b-779daaeb7a52?source=cve
- https://blog.nintechnet.com/wordpress-frontend-file-manager-plugin-fixed-multiple-critical-vulnerabilities/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/49150180-9de0-4318-b21b-779daaeb7a52?source=cve