CVE-2024-5598
📋 TL;DR
The Advanced File Manager WordPress plugin exposes sensitive files to unauthenticated attackers through a vulnerable function. This allows extraction of backups and other confidential data from the Trash folder. All WordPress sites using this plugin up to version 5.2.4 are affected.
💻 Affected Systems
- Advanced File Manager WordPress Plugin
📦 What is this software?
Advanced File Manager by Advancedfilemanager
⚠️ Risk & Real-World Impact
Worst Case
Attackers download database backups containing credentials, PII, or encryption keys, leading to full site compromise and data breaches.
Likely Case
Unauthenticated attackers access sensitive configuration files, backup archives, or uploaded files containing business information.
If Mitigated
Limited exposure if no sensitive files exist in the Trash folder, but the vulnerability still provides unauthorized file access.
🎯 Exploit Status
Simple HTTP request to vulnerable endpoint; no authentication required.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 5.2.5
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3107587/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Advanced File Manager' and click 'Update Now'. 4. Verify version is 5.2.5 or higher.
🔧 Temporary Workarounds
Disable Plugin
allTemporarily deactivate the Advanced File Manager plugin until patched.
wp plugin deactivate file-manager-advanced
Block Vulnerable Endpoint
linuxUse web server or WAF to block access to the vulnerable function.
# Apache: RewriteRule ^.*fma_local_file_system.*$ - [F]
# Nginx: location ~* fma_local_file_system { deny all; }
🧯 If You Can't Patch
- Disable the Advanced File Manager plugin immediately.
- Implement strict file access controls and monitor for unauthorized file access attempts.
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Advanced File Manager version. If version ≤5.2.4, vulnerable.
Check Version:
wp plugin get file-manager-advanced --field=version
Verify Fix Applied:
Confirm plugin version is 5.2.5 or higher in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- HTTP requests containing 'fma_local_file_system' parameter
- Unusual file access patterns from unauthenticated users
Network Indicators:
- GET/POST requests to WordPress endpoints with file access parameters
SIEM Query:
source="web_logs" AND uri="*fma_local_file_system*"
🔗 References
- https://plugins.trac.wordpress.org/browser/file-manager-advanced/trunk/application/class_fma_connector.php#L13
- https://plugins.trac.wordpress.org/changeset/3107587/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/9d4ff5ed-8857-46b8-942b-ac0f47880a95?source=cve
- https://plugins.trac.wordpress.org/browser/file-manager-advanced/trunk/application/class_fma_connector.php#L13
- https://plugins.trac.wordpress.org/changeset/3107587/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/9d4ff5ed-8857-46b8-942b-ac0f47880a95?source=cve