CVE-2026-1280

7.5 HIGH

📋 TL;DR

This vulnerability in the Frontend File Manager WordPress plugin allows unauthenticated attackers to share any uploaded file via email by exploiting a missing capability check. Attackers can enumerate sequential file IDs to exfiltrate sensitive data intended only for administrators. All WordPress sites using vulnerable plugin versions are affected.

💻 Affected Systems

Products:
  • Frontend File Manager WordPress Plugin
Versions: All versions up to and including 23.5
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with the vulnerable plugin active. File enumeration is possible due to sequential integer file IDs.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete data breach of all uploaded files including sensitive documents, credentials, and proprietary information stored via the plugin.

🟠

Likely Case

Exfiltration of sensitive user-uploaded files containing personal data, financial information, or confidential business documents.

🟢

If Mitigated

Limited exposure if no sensitive files were uploaded through the plugin or if files were stored with proper encryption.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Simple HTTP POST request to vulnerable AJAX endpoint with file ID parameter. Attackers can brute-force sequential IDs to enumerate all files.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 23.6 or later

Vendor Advisory: https://plugins.trac.wordpress.org/browser/nmedia-user-file-uploader

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Frontend File Manager' and click 'Update Now'. 4. Verify plugin version is 23.6 or higher.

🔧 Temporary Workarounds

Disable vulnerable AJAX endpoint

all

Add capability check to prevent unauthorized access to wpfm_send_file_in_email action

Add 'if (!current_user_can('manage_options')) { wp_die(); }' before line 98 in inc/callback-functions.php

Deactivate plugin

linux

Temporarily disable the Frontend File Manager plugin

wp plugin deactivate nmedia-user-file-uploader

🧯 If You Can't Patch

  • Implement web application firewall rules to block requests to /wp-admin/admin-ajax.php with action=wpfm_send_file_in_email from unauthenticated users
  • Monitor and alert on unusual email sending activity or file enumeration attempts

🔍 How to Verify

Check if Vulnerable:

Check if plugin version is 23.5 or earlier in WordPress admin plugins page or via wp plugin list --field=version --name=nmedia-user-file-uploader

Check Version:

wp plugin list --field=version --name=nmedia-user-file-uploader

Verify Fix Applied:

Confirm plugin version is 23.6+ and test that unauthenticated POST requests to admin-ajax.php with action=wpfm_send_file_in_email return proper authorization error

📡 Detection & Monitoring

Log Indicators:

  • Multiple POST requests to /wp-admin/admin-ajax.php with action=wpfm_send_file_in_email from same IP
  • Failed authorization attempts for wpfm_send_file_in_email action

Network Indicators:

  • Unusual email traffic from WordPress server
  • Pattern of sequential file ID requests to AJAX endpoint

SIEM Query:

source="wordpress.log" AND "admin-ajax.php" AND "wpfm_send_file_in_email" AND NOT user="authenticated"

🔗 References

📤 Share & Export