CVE-2023-6825

Description

The File Manager and File Manager Pro plugins for WordPress are vulnerable to Directory Traversal in versions up to, and including version 7.2.1 (free version) and 8.3.4 (Pro version) via the target parameter in the mk_file_folder_manager_action_callback_shortcode function. This makes it possible for attackers to read the contents of arbitrary files on the server, which can contain sensitive information and to upload files into directories other than the intended directory for file uploads. The free version requires Administrator access for this vulnerability to be exploitable. The Pro version allows a file manager to be embedded via a shortcode and also allows admins to grant file handling privileges to other user levels, which could lead to this vulnerability being exploited by lower-level users.

Category

9.9
CVSS
Severity: Critical
CVSS 3.1 •
EPSS 1.60% Top 20%
Third-Party Advisory wordfence.com
Affected: mndpsingh287 File Manager
Affected: File Manager File Manager Pro
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2023-6825?
CVE-2023-6825 has been scored as a critical severity vulnerability.
How to fix CVE-2023-6825?
To fix CVE-2023-6825, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2023-6825 being actively exploited in the wild?
It is possible that CVE-2023-6825 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~2% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2023-6825?
CVE-2023-6825 affects mndpsingh287 File Manager, File Manager File Manager Pro.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.